Instead of the usual phishing email or fake download page, attackers are using Google Forms to kick off the infection chain. The attack typically begins when a victim downloads a business-themed ZIP ...
Speagle malware exploits Cobra DocGuard servers to exfiltrate sensitive data, indicating targeted espionage risks for protected systems.
During tax season, threat actors reliably take advantage of the urgency and familiarity of time-sensitive emails, including ...
The digital battlefield is shifting. For decades, the fight between security software and malicious code was a game of ...
In addition to enabling remote access, the malware supports a wide range of capabilities, including data theft and spying.
Hundreds of GitHub repositories seemingly offering “free game cheats” deliver malware, including the Vidar infostealer, ...
Alibaba reveals OpenClaw app — despite the Chinese government recently cracking down on the platform
OpenClaw adoption continues growing despite warnings about potential security risks Alibaba and Baidu release apps allowing ...
The LeakNet ransomware gang is now using the ClickFix technique for initial access into corporate environments and deploys a ...
We found fake “verify you are human” pages on hacked WordPress sites that trick Windows users into installing the Vidar ...
The campaign, observed in February 2026, has been assessed to share overlaps with a prior campaign mounted by Laundry Bear, a group tracked by Microsoft as Void Blizzard.
Researchers say they’ve discovered a supply-chain attack flooding repositories with malicious packages that contain invisible code, a technique that’s flummoxing traditional defenses designed to ...
A new malware strain dubbed Slopoly, likely created using generative AI tools, allowed a threat actor to remain on a compromised server for more than a week and steal data in an Interlock ransomware ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results