VOID#GEIST malware campaign delivers XWorm, AsyncRAT, and Xeno RAT using batch scripts, Python loaders, and explorer.exe ...
A newly discovered InstallFix campaign relies on malicious commands on cloned installation webpages to trick victims into installing malware.
The Arkanix Stealer malware can collect and exfiltrate system information, browser data, VPN information, and arbitrary files ...
North Korea-linked ScarCruft’s Ruby Jumper uses Zoho WorkDrive C2 and USB malware to breach air-gapped systems for ...
North Korean hackers are deploying newly uncovered tools to move data between internet-connected and air-gapped systems, spread via removable drives, and conduct covert surveillance.
Cybersecurity should be as much about monitoring ad calls as securing fire-walls, according to a cybersecurity firm.
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released new details about RESURGE, a malicious implant used in zero-day attacks exploiting CVE-2025-0282 to breach Ivanti Connect ...
PromptSpy, discovered by ESET, is the first known Android malware to integrate generative AI into its execution flow.
A compromised Chrome extension with 7,000 users was updated to deploy malware, strip security headers, and steal cryptocurrency wallet seed phrases.
There are moments in the evolution of a nation when a single incident, seemingly isolated, exposes a deeper and more troubling ...
Crypto wallets and iPhones are under threat from the Coruna exploit kit and users should think twice before using web3 ...