A China-linked advanced persistent threat actor tracked as UAT-9244 has been targeting telecommunication service providers in South America since 2024, compromising Windows, Linux, and network-edge ...
Cybercriminals are now able to rent Malware-as-a-service and legally install malware on your PC. Learn how to identify these ...
Is that CAPTCHA you just encountered real? Find out how fake CAPTCHAs are installing hidden malware and how to stay safe.
Gain more control over your DNS queries ...
Researchers have uncovered a malware campaign targeting 7-Zip users through fake domain 7zip.com, turning infected computers into proxy nodes.
A fake 7-Zip website is distributing a trojanized installer of the popular archiving tool that turns the user’s computer into a residential proxy node. Residential proxy networks use home user devices ...
VoidLink, the recently discovered Linux malware which targets Linux-based cloud servers, was likely almost entirely generated by AI, researchers have said. First detailed by cybersecurity analysts at ...
A new malware campaign is turning WhatsApp Web into a weapon. Security researchers say a banking Trojan linked to Astaroth is now spreading automatically through chat messages, making the attack ...
We are either at the dawn of AI-driven malware that rewrites itself on the fly, or we are seeing vendors and threat actors exaggerate its capabilities. Recent Google and MIT Sloan reports reignited ...
Researchers have identified a new banking malware that replaces your actual banking app with a malicious one. It primarily spreads through APKs distributed via unmoderated channels such as messaging ...
Threat actors are testing malware that incorporates large language models (LLMs) to create malware that can evade detection by security tools. In an analysis published earlier this month, Google's ...