Microsoft Threat Intelligence has identified a new variant of the XCSSET macOS malware in limited attacks, marking...
Malware Detection
A significant Android ad fraud campaign known as “SlopAds” has been disrupted following the removal of 224...
A significant evolution in the threat landscape targeting misconfigured Docker API endpoints has been observed, shifting from...
A newly discovered phishing campaign uses malicious SVG files to impersonate Colombia’s judicial system and deliver malware,...
Malware persistence represents one of the most significant challenges in modern cybersecurity defense, enabling attackers to maintain...
Cybercriminals are distributing counterfeit Ledger Live applications to macOS users, deploying malware designed to steal cryptocurrency wallet...
For at least six months, Procolored, a manufacturer of direct-to-film (DTF) printers, distributed malware-infected drivers through its...
Illegal streaming of sports events, including the Cheltenham Festival and top-flight matches, poses significant cybersecurity risks alongside...
Obfuscation remains a critical tool for attackers aiming to conceal malicious code from defenders. By deliberately complicating...
Steganography remains a persistent threat vector in cybersecurity, with attackers increasingly embedding malicious payloads within seemingly benign...
Wildberries, Russia’s largest online marketplace, in collaboration with Russ, has successfully disrupted a sophisticated fraud operation involving...
The UK has seen a surge in illegal streaming of sports events like the Cheltenham Festival and...
Cybercriminals are exploiting DeepSeek’s growing popularity by distributing malware through fake sponsored Google ads, according to a...
Deep learning models power critical systems like autonomous vehicles and medical diagnostics, but their reliance on complex...
Security researchers have uncovered a sophisticated malware campaign distributing the LummaC2 information stealer disguised as a cracked...
A newly discovered malware campaign is leveraging the JPHP interpreter – a PHP implementation running on the...
A China-linked cyberespionage group known as StormBamboo (also tracked as Evasive Panda, Daggerfly, and Bronze Highland) has...
A new malware campaign has been identified distributing trojanized versions of Zoom installers bundled with cryptocurrency mining...
Backdoor.MSIL.BLADABINDI.THA represents a concerning Windows-based backdoor malware that security teams should monitor, particularly due to its recent...
Trojan.MSIL.SUPERNOVA.A represents a significant Windows-based threat with high damage potential despite its currently limited distribution. First identified...