Pronsis Loader can evade signature-based detection systems, which are typically designed to recognize more common programming ...
North Korean hackers are reportedly leveraging Google's Flutter app development tool to conceal malware within seemingly ...
Those routers are compromised using MIPS-based malware and webshells that communicate over non-standard ports, making ...
North Korean hackers have disguised malware in seemingly harmless macOS apps using sophisticated code to bypass security ...
Hackers are targeting Windows machines using the ZIP file concatenation technique to deliver malicious payloads in compressed ...
This makes the malware hard to detect by traditional antivirus solutions. The campaign has primarily targeted countries like ...
Malicious cyber activity in the first six months in the maritime sector increased significantly compared to the previous year ...
The malware is engineered to connect to an adversary-controlled OneDrive account using hard-coded Entra ID (formerly Azure Active Directory) credentials, using it as a C2 for fetching and executing ...
Android users take notice. The new and improved "FakeCall" malware convincingly hijacks bank phone calls and redirects them ...
An especially interesting trick here: the malware was set up to execute AppleScript commands sent from the server and even ...
The malicious Excel document is designed to exploit a known remote code execution flaw in Office ( CVE-2017-0199, CVSS score: ...
Contextal announces launch of Contextal Platform, a powerful, open-source cybersecurity solution for contextual threat detection and intelligence.