A recent wave of threats highlights evolving attacker tactics: a Formbook campaign is distributing phishing emails with ZIP attachments containing obfuscated VBS scripts to trigger infections, while operators of the Contagious I ...
Read More
Even when you think the RATs are gone, they somehow find their way back. The notorious DarkComet RAT, long discontinued by its creator, has resurfaced through a new malware campaign that hides behind fake Bitcoin tools to infect ...
Read More
A surge of malicious activity has been observed across the cyber landscape. Maverick malware is targeting Brazil’s largest banks, hijacking browser sessions and propagating through WhatsApp Web. Meanwhile, researchers have uncov ...
Read More
Looks like the GlassWorm is back to burrow through developer ecosystems again—this time wriggling into the OpenVSX marketplace with malicious VSCode extensions that have already snared over 10,000 downloads. Meanwhile, researche ...
Read More
Phishing remains a top attack vector, enabling threat actors to breach networks through deceptive emails and messages. Russia-linked InedibleOchotense used phishing and Signal messages to deliver trojanized ESET installers deplo ...
Read More
Russia’s notorious Sandworm group has slithered back into action, launching destructive cyberattacks on Ukraine’s grain and other industries using data-wiping malware like ZeroLot and Sting to cripple operations. In parallel, a ...
Read More
Attackers are demonstrating incredible range, hitting novel AI infrastructure, decentralized finance, and personal mobile apps. Researchers revealed a sophisticated backdoor named SesameOp, which cleverly exploits OpenAI's API fo ...
Read More
Cybercriminals are proving adept at turning trusted infrastructure against its users, from enterprise software to the phone in your pocket. A newly discovered Windows malware named Airstalk is now exploiting the AirWatch API for ...
Read More
Today’s threats highlight the vast and varied attack surface, from open-source code repositories to the billions of devices connecting to the internet. A new campaign named PhantomRaven has emerged, with hundreds of malicious npm ...
Read More
Attackers are showcasing alarming ingenuity this week, from hiding in code repositories to mimicking human behavior on infected devices. Researchers uncovered 10 malicious npm packages that used typosquatting to trick developers, ...
Read More