News
A new Coyote malware variant abuses Windows tools to steal banking and crypto data. It tracks user activity via UI Automation and spreads via the Squirrel installer.
CISA has warned that attackers are actively exploiting two security vulnerabilities in the SysAid IT service management (ITSM ...
A new Russia-based family of malware has been observed using a large language model (LLM) to issue commands on compromised ...
Recent cyberattacks deploying the potent Authentic Antics malware tool to target Microsoft cloud accounts were the handiwork ...
Hackers use OneNote to deliver embedded malware or credential‑stealing links, all concealed beneath innocuous-looking surfaces.
A novel crypter named “Ghost Crypt” used to deliver PureRAT malware, using an advanced obfuscation and a technique dubbed “Process Hypnosis.” ...
The Punjab Police have introduced a new cyber kiosk in Mohali for analyzing malware on mobile devices. This initiative allows citizens to safely scan their phones, USB drives, and external storage.
APT28 targets Ukrainian government officials with a phishing campaign delivering LAMEHUG malware, utilizing Alibaba Cloud’s ...
Malicious GitHub repositories used by threat actors to host Amadey payloads and steal data, impacting targeted entities.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results