The multi-stage attack uses encrypted shellcode, steganography, and reflective DLL loads to deploy XWorm without leaving ...
Cybersecurity researchers have disclosed details of a new malware family dubbed YiBackdoor that has been found to share "significant" source code overlaps with IcedID and Latrodectus.
A newly-discovered malicious package with layers of obfuscation is disguised as a utility library, with malware essentially ...
Iranian cyber group UNC1549 hacked 11 telecom firms, deploying Azure-hosted MINIBIKE malware through LinkedIn lures to steal ...
PromptLock hunts down your critical system files, encrypts them, and holds them for ransom. And this is just a test version.
ClickFix typically asks the victim to perform a fake CAPTCHA test. FileFix tricks the user into copying and pasting a command ...
IntroductionZloader (a.k.a. Terdot, DELoader, or Silent Night) is a Zeus-based modular trojan that emerged in 2015. Zloader was originally designed to facilitate banking, but has since been repurposed ...
Always-online DRM can be found in many online games. There’s an argument to be made that multiplayer-focused games are fine ...
Malicious executable files represent one of the most direct threats to your hard drive's health and data integrity. These ...
Hackers have been spotted using SEO poisoning and search engine advertisements to promote fake Microsoft Teams installers ...
VirusTotal has discovered a phishing campaign hidden in SVG files that create convincing portals impersonating Colombia's judicial system that deliver malware. VirusTotal detected this campaign after ...
Security researchers from Trend Micro recently published an in-depth technical analysis of the latest iteration of the ...