As businesses continue their digital transformation journeys, they are exposed to an ever-expanding attack surface. With the proliferation of cloud environments, remote work, and the increasing use of ...
Discover how crypto malware operates through cryptojacking and ransomware, with real-world examples such as WannaMine and PowerGhost ...
It’s easy to get these two terms mixed up: advanced threat protection (ATP) and advanced persistent threat (APT). They sound ...
A new WhatsApp Web attack spreads self-propagating ZIP files containing Astaroth banking malware through trusted ...
A malicious extension impersonating an ad blocker forces repeated browser crashes before pushing victims to run ...
Ransomware attackers targeting a Fortune 100 company in the finance sector used a new malware strain, dubbed PDFSider, to deliver malicious payloads on Windows systems.
A new ClickFix social engineering campaign is targeting the hospitality sector in Europe, using fake Windows Blue Screen of ...
Browser extensions turned malicious after years of legitimate operation in DarkSpectre campaign affecting millions. The ...
Experts exploited an XSS flaw in StealC’s admin panel, exposing operator sessions, system details & stolen cookies without ...
A new report out today from managed detection and response company Expel Inc. details a newly identified variant of the Shai Hulud malware that is demonstrating how software supply chain attacks are ...
Fileless attacks abuse trusted tools, scripts, and CI/CD pipelines, creating blind spots that file-based security can’t ...
Predator spyware's has advanced anti-forensics and anti-detection capabilities, and can learn from its own failures.