Pronsis Loader can evade signature-based detection systems, which are typically designed to recognize more common programming ...
North Korean hackers are reportedly leveraging Google's Flutter app development tool to conceal malware within seemingly ...
Those routers are compromised using MIPS-based malware and webshells that communicate over non-standard ports, making ...
A complex phishing campaign attributed to the Iranian-linked threat actor TA455, has been observed using sophisticated ...
Hackers are targeting Windows machines using the ZIP file concatenation technique to deliver malicious payloads in compressed ...
This makes the malware hard to detect by traditional antivirus solutions. The campaign has primarily targeted countries like ...
The malware is engineered to connect to an adversary-controlled OneDrive account using hard-coded Entra ID (formerly Azure Active Directory) credentials, using it as a C2 for fetching and executing ...
Android users take notice. The new and improved "FakeCall" malware convincingly hijacks bank phone calls and redirects them ...
An especially interesting trick here: the malware was set up to execute AppleScript commands sent from the server and even ...
The malicious Excel document is designed to exploit a known remote code execution flaw in Office ( CVE-2017-0199, CVSS score: ...
To keep your Mac safe, consider malware protection software. On your phone, use two-factor authentication and a password ...
In a new phishing campaign detected by Cofense Intelligence, threat actors used a novel approach by leveraging trusted GitHub ...