A hacking group that is believed to be Chinese state-sponsored has compromised two websites with ties to the Tibetan ...
The attackers are using Google's Flutter platform to make malicious crypto apps that can ultimately grant remote access to a ...
Another worrying flurry of Android malware headlines this week, with a new warning that dangerous new spyware is now ...
North Korean Lazarus Group uses extended macOS file attributes to deliver RustyAttr malware to unsuspecting users ...
Security researchers have discovered that malicious actors have been using ZIP file concatenation to avoid the detection of ...
The malware files contain a fair amount of obfuscated code, as well as fake licensing info, to make the files appear ...
The malicious Excel document is designed to exploit a known remote code execution flaw in Office ( CVE-2017-0199, CVSS score: ...
Stephanie Ness, an expert in the cybersecurity domain, has pioneered research on Deep URL Profiling, an advanced approach to ...
The Chinese state-sponsored hacking group Volt Typhoon has begun to rebuild its "KV-Botnet" malware botnet after it was disrupted by law enforcement in January, according to researchers from ...
Think "Stranger Things" on Netflix. The malware we’re talking about here is just like that. It’s called FakeCalls, and every time researchers figure out how it infects devices, it evolves with ...
The malware bundle dropper is distributed through forums and torrent trackers as a crack tool that activates legitimate versions of various software like Foxit PDF Editor, JetBrains and AutoCAD.
SentinelLabs observed the North Korean group BlueNoroff targeting crypto firms via a multi-stage malware campaign which utilizes a novel persistence mechanism ...