Browser extensions turned malicious after years of legitimate operation in DarkSpectre campaign affecting millions. The ...
We often find ourselves needing to convert or merge files. However, not all of us have software installed on our PCs to perform that task. In this case, many of us turn to the internet to search for ...
A WhatsApp worm is spreading Astaroth banking malware, automating infections and escalating financial cybercrime risks.
A GitHub flaw, or possibly a design decision, is being abused by threat actors to distribute malware using URLs associated with Microsoft repositories, making the files appear trustworthy. While most ...
The Windows Blue Screen (or Black Screen) of Death is typically a sign that some unrecoverable error or conflict has occurred. Now, cybercriminals are using the dreaded BSOD as a way to trick people ...
When it’s time to upgrade to a new computer, the excitement can be overshadowed by the concern of transferring existing data without bringing along any unwanted viruses or malware. Philip from Troy, ...
Attackers are hiding interesting malware in a boring place, hoping victims won’t bother to look. Where’s the last place you’d expect to find malware? In an email from your mother? Embedded in software ...
Researchers from Mimecast have recently observed a campaign where threat actors are using a somewhat rarely seen but easy method to distribute malware using Microsoft Excel's standard file encryption ...
Attackers using the Snake keylogger malware for Windows are emailing malicious PDFs with embedded Word documents to infect victims' PCs and steal information. Malicious PDFs are an unusual tool to use ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results