Signed malware backed by a stolen EV certificate deployed legitimate RMM tools to gain persistent access inside enterprise ...
Crims hope for payday from malicious payloads rather than stealing access tokens Microsoft has warned organizations about ...
IntroductionThreat actors often take advantage of major global events to fuel interest in their malicious activities. Zscaler ThreatLabz is diligently tracking a surge in cybercriminal activity that ...
New hacking cluster exploits web servers and Mimikatz to infiltrate Asian infrastructure for long-term espionage in aviation, ...
Ransomware threat actors tracked as Velvet Tempest are using the ClickFix technique and legitimate Windows utilities to deploy the DonutLoader malware and the CastleRAT backdoor.
Researchers link Silver Dragon APT to APT41 after attacks on government entities using Cobalt Strike, DNS tunneling, and ...
TrustConnect is back, this time used to deploy legitimate but weaponized RMM solutions.
Fake OpenClaw installers hosted in GitHub repositories and promoted by Microsoft Bing's AI-enhanced search feature instructed users to run commands that deployed information stealers and proxy malware ...
Cybercriminals are now able to rent Malware-as-a-service and legally install malware on your PC. Learn how to identify these ...
China linked APT41 hackers deploy Silver Dragon campaign targeting organizations with malware and espionage tactics.
If you suspect you've been hacked, it's crucial to act fast and secure your devices and accounts to avoid further losses.
Security researchers have uncovered a complex cyber operation targeting telecommunications infrastructure with newly identified malware tools. The campaign, active since 2024, focuses on telecom ...