Security researchers have discovered that malicious actors have been using ZIP file concatenation to avoid the detection of ...
Once opened, the apps don't match their names; they include either a basic minesweeper game or pose as a note-taking app. But ...
A hacking group that is believed to be Chinese state-sponsored has compromised two websites with ties to the Tibetan ...
To detect, observe, and analyze different types of malicious TTPs in a safe environment, we can use ANY.RUN's Interactive ...
New custom malware loader written in JPHP is wreaking havoc The custom payload is difficult to detect using cybersecurity ...
Security experts are raising the alarm against another search query on Google that comes under the tag of SEO poisoned. This ...
Experts found six malicious apps built for macOS The Apple IDs used to sign the apps have been revoked The malware was likely just an experiment North Korean state-sponsored threat actors have been ...
An updated Android trojan called FakeCall hijacks bank calls. Tech expert Kurt “CyberGuy" Knutsson says Android phone ...
A new BYOVD attack ends with an infostealer and cryptominer inserted into your Windows PC. The threat campaign named SteelFox ...
If you’ve just taken delivery of a new MacBook Pro, here are 99 reasons you shouldn’t ignore the Mac malware threat. What you need to know.
A new malicious package called 'SteelFox' mines for cryptocurrency and steals credit card data by using the "bring your own ...
Security researchers suspect North Korean attackers behind a macOS malware campaign targeting crypto companies.