"The 2025 Consumer Summary Report demonstrates that many vendors continue to deliver a very high level of protection," said Andreas Clementi, CEO and Founder of AV-Comparatives. "Our goal remains to ...
"The 2025 Consumer Summary Report demonstrates that many vendors continue to deliver a very high level of protection," said Andreas Clementi, CEO and Founder of AV-Comparatives. "Our goal remains to ...
Researchers discovered a modular, "cloud-first" framework that is feature-rich and designed to maintain stealthy, long-term ...
Check Point researchers have discovered a modular malware framework likely designed by Chinese developers to harvest ...
Detected by Check Point researchers, VoidLink is a sophisticated malware framework that can be used to implant malware in the ...
The Windows Blue Screen (or Black Screen) of Death is typically a sign that some unrecoverable error or conflict has occurred. Now, cybercriminals are using the dreaded BSOD as a way to trick people ...
We’ve recently seen how ChatGPT was used to trick Mac users into installing MacStealer, and now a different tactic has been found to persuade users to install a version of MacSync Stealer. The Mac ...
The security research team at iVerify Threat Intelligence have discovered a new Remote Access Trojan (RAT) that has been dubbed Cellik, and which is targeting Android users. It includes features ...
A campaign involving 19 Visual Studio (VS) Code extensions that embed malware inside their dependency folders has been uncovered by cybersecurity researchers. Active since February 2025 but identified ...
A crypto user has fallen victim to a malware attack where the hacker got away with $27 million. The process involved poisoning the user’s computer, which then allowed the hacker access to critical ...
ESET researchers have identified new MuddyWater activity primarily targeting organizations in Israel, with one confirmed target in Egypt. MuddyWater, also referred to as Mango Sandstorm or TA450, is ...