News

The Matanbuchus malware loader has been seen being distributed through social engineering over Microsoft Teams calls ...
Hiding ransomware inside a CPU was strange but now, attackers are going even deeper and broader across networks. In a recent ...
A new attack uses CVE-2021-41773 in Apache HTTP Server to install a cryptocurrency miner via compromised websites.
Researchers found evidence of Joke Screenmate malware hiding on DNS servers Joke Screenmate is a harmless, prank malware There are ways to defend against it Hackers found a way to hide malware in the ...
According to new research from SlashNext, Platforms like Hoax Tech and JS Click Cloaker are offering “cloaking-as-a-service” ...
Threat actors are using anti-box tools, AI, and cloaking-as-a-service tactics to bypass security tools by showing a phishing or other malicious site to targets and harmless ones to detection and ...
Malicious GitHub repositories used by threat actors to host Amadey payloads and steal data, impacting targeted entities.
AV-Comparatives Approved Business Security Product Award for July 2025 - Participants AV-Comparatives ISO9001:2015 ...
The infamous Trojan from 2019 is once again making headlines. Security researchers from ESET have discovered that AsyncRAT is ...
Enterprise attack surfaces are expanding rapidly. To keep up, cybersecurity must evolve—moving from siloed tools to unified, ...
Some 58% of organisations in Thailand reported facing artificial intelligence (AI)-driven cyberthreats over the past year.
A Europol operation has succeeded in disrupting a pro-Russian hacktivist network accused of conducting DDoS cyber attacks on targets in Ukraine and Europe.