Signed malware backed by a stolen EV certificate deployed legitimate RMM tools to gain persistent access inside enterprise ...
IntroductionThreat actors often take advantage of major global events to fuel interest in their malicious activities. Zscaler ThreatLabz is diligently tracking a surge in cybercriminal activity that ...
Ransomware threat actors tracked as Velvet Tempest are using the ClickFix technique and legitimate Windows utilities to deploy the DonutLoader malware and the CastleRAT backdoor.
Researchers link Silver Dragon APT to APT41 after attacks on government entities using Cobalt Strike, DNS tunneling, and ...
VOID#GEIST malware campaign delivers XWorm, AsyncRAT, and Xeno RAT using batch scripts, Python loaders, and explorer.exe ...
TrustConnect is back, this time used to deploy legitimate but weaponized RMM solutions.
Hackers are hijacking email accounts and sending fake invites that install remote access tools. Even your antivirus may not ...
Check Point research found three critical flaws in Anthropic's Claude Code that allow attackers to execute arbitrary commands ...
Fake OpenClaw installers hosted in GitHub repositories and promoted by Microsoft Bing's AI-enhanced search feature instructed users to run commands that deployed information stealers and proxy malware ...
Cybercriminals are now able to rent Malware-as-a-service and legally install malware on your PC. Learn how to identify these ...
North Korean hacking group APT37 was seen deploying new implants, backdoors, and other tools in attacks targeting air-gapped ...
If you suspect you've been hacked, it's crucial to act fast and secure your devices and accounts to avoid further losses.