Chinese state-sponsored hackers have been compromising government networks worldwide by embedding malware in trusted ...
A China-linked advanced persistent threat actor tracked as UAT-9244 has been targeting telecommunication service providers in South America since 2024, compromising Windows, Linux, and network-edge ...
Microsoft's Defender Security Research Team has identified a series of phishing campaigns in which an unknown attacker used digitally signed malware masked as common workplace applications to deploy ...
Signed malware backed by a stolen EV certificate deployed legitimate RMM tools to gain persistent access inside enterprise ...
Microsoft warns of a campaign on chat platforms where attackers slip malware to victims as supposed gaming tools.
OAuth redirection is being repurposed as a phishing delivery path. Trusted authentication flows are weaponized to move users ...
Abstract: As the Internet of Things digital systems have been becoming increasingly complex, so are the cybersecurity issues, which, in turn, have been heightened by the malicious activities of ...
North Korea-linked ScarCruft’s Ruby Jumper uses Zoho WorkDrive C2 and USB malware to breach air-gapped systems for ...
In Trend Micro's Apex One, developers have closed code smuggling vulnerabilities. IT managers should update quickly.
A convincing lookalike of the popular Huorong Security antivirus has been used to deliver ValleyRAT, a sophisticated Remote Access Trojan (RAT) built on the Winos4.0 framework, to users who believed ...