The Gootloader malware, typically used for initial access, is now using a malformed ZIP archive designed to evade detection ...
SHADOW#REACTOR is a malware campaign using VBS, PowerShell, and MSBuild to stealthily deploy Remcos RAT with persistent ...
Attackers use a sophisticated delivery mechanism for RAT deployment, a clever way to bypass defensive tools and rely on the ...
Active malware exploits DLL side-loading in a signed GitKraken binary to deliver trojans, stealers, and remote access malware ...
The phishing campaign shows how attackers continue to weaponize legitimate cloud services and open source tools to evade ...
Discover how crypto malware operates through cryptojacking and ransomware, with real-world examples such as WannaMine and PowerGhost ...
TL;DR Introduction Infostealers are not new malware. They have been around for decades. What has changed is how effective ...
SHADOW#REACTOR malware uses scripts and Windows tools to deploy Remcos RAT quietly, bypass defenses, and gain lasting remote ...
A leak from the Chinese cybersecurity firm Knownsec exposed its deep involvement in state-linked offensive cyber activity and ...
The Windows Blue Screen (or Black Screen) of Death is typically a sign that some unrecoverable error or conflict has occurred. Now, cybercriminals are using the dreaded BSOD as a way to trick people ...
A cross-site scripting (XSS) flaw in the web-based control panel used by operators of the StealC info-stealing malware ...
Security firm Koi has been busy lately. Its researchers have not only uncovered a sprawling spyware campaign, but they're also keeping tabs on the ever-evolving malware dubbed GlassWorm. In its latest ...