Cybersecurity firm Infoblox reveals that over 90 percent of parked domains now redirect visitors to scams and malware, making ...
A newly discovered third variant of the Shai Hulud malware is raising fresh concerns about the security of the open-source software supply chain, as researchers warn that the latest version shows more ...
The ClickFix campaign disguises malware as legitimate Windows updates, using steganography to hide shellcode in PNG files and bypass security detection systems.
New SantaStealer malware reportedly threatens holiday shoppers with password theft. This Christmas-themed info-stealer ...
The text and code editing tool EmEditor was targeted in a supply chain attack that resulted in the distribution of ...
A new Android banking trojan called Sturnus is shaping up to be one of the most capable threats we have seen in a while. It is still in early development, but it already behaves like a fully mature ...
A Lithuanian national has been arrested for his alleged involvement in infecting 2.8 million systems with clipboard-stealing ...
New MacSync Stealer version is executed via a signed and notarized Swift application, eliminating the need for direct ...
Cybercriminals are exploiting demand for pirated movies by disguising malware as a fake torrent of “One Battle After Another,” a new Leonardo DiCaprio film, tricking Windows users into infecting their ...
Android malware operations evolve with droppers SMS theft and remote access tools spreading fast and risking user data and ...
A wave of recent breaches and malware discoveries shows how easily trusted software and private data can be exploited.
Bitdefender reports that some torrents of One Battle After Another currently available online contain PowerShell scripts and image archives that, when executed, build a memory-resident ...