The Pakistan-linked threat actor APT36 (also known as Transparent Tribe or Mythic Leopard) has significantly evolved its...
Malware Analysis
Cybersecurity firm Profero has successfully reverse-engineered the encryption mechanism used by the DarkBit ransomware group, enabling victims...
Arch Linux has removed three compromised packages from its Arch User Repository (AUR) after discovering they contained...
A new malware strain named LameHug has been discovered using large language models (LLMs) to dynamically generate...
The latest iteration of the Godfather Android banking trojan has adopted a sophisticated virtualization technique to bypass...
An international law enforcement operation codenamed “Operation Secure” has disrupted global infostealer malware infrastructure, resulting in 32...
Two malicious RubyGems packages have been discovered masquerading as popular Fastlane CI/CD plugins, designed to intercept and...
The official website for RVTools, a widely used VMware management utility, was compromised in a supply chain...
For at least six months, Procolored, a manufacturer of direct-to-film (DTF) printers, distributed malware-infected drivers through its...
Peeling boiled eggs can be a frustrating task, especially when the shell sticks to the egg white,...
The Outlaw cybergang, also known as “Dota,” has intensified its global campaign against Linux systems, deploying a...
MintsLoader has emerged as a sophisticated malware loader distributing payloads like GhostWeaver, StealC, and a modified BOINC...
Pulsegram is a Python-based keylogger integrated with a Telegram bot, designed for capturing keystrokes, clipboard content, and...
A newly identified Python-based Remote Access Trojan (RAT) leveraging Discord for command-and-control (C2) operations has raised significant...
A new malware variant, dubbed Hannibal Stealer, has emerged as a cracked and rebranded version of the...
Obfuscation remains a critical tool for attackers aiming to conceal malicious code from defenders. By deliberately complicating...
The fourth week of April 2025 saw significant developments in mobile security, particularly around Android malware campaigns...
Steganography remains a persistent threat vector in cybersecurity, with attackers increasingly embedding malicious payloads within seemingly benign...
The gaming community has become a prime target for cybercriminals, with the emergence of AgeoStealer, a sophisticated...
A newly discovered remote access trojan (RAT), dubbed ResolverRAT, has been observed targeting organizations in the healthcare...