All posts tagged "Malware"
-
Security
/ 3 weeks agoHackers Use Fake Software Installers to Spread Malware
Security researchers have identified a financially motivated cybercriminal campaign distributing remote access trojans and cryptocurrency mining software through fraudulent software installers....
-
Security
/ 3 weeks agoMicrosoft Warns of WhatsApp Malware Targeting Windows
Microsoft has identified a new cyberattack campaign that uses WhatsApp messages to deliver malicious scripts capable of taking control of Windows...
-
Security
/ 3 weeks agoCERT-UA Impersonated in Phishing Campaign Spreading AGEWHEEZE Malware
The Computer Emergency Response Team of Ukraine (CERT-UA) has disclosed a widespread phishing campaign in which threat actors impersonated the cybersecurity...
-
Security
/ 3 weeks agoAttackers Shift to Abusing Trusted IT Tools, Evading Detection
cybersecurity professionals worldwide are reporting a significant shift in the tactics of malicious actors, who are increasingly forgoing traditional malware in...
-
Security
/ 3 weeks agoSilver Fox Hackers Target Asia with New RAT and Fake Domains
A sophisticated cyber espionage campaign is actively targeting Chinese-speaking users across Asia, deploying a previously undocumented remote access trojan through counterfeit...
-
Security
/ 4 weeks agoAxios npm Package Compromised in Supply Chain Attack
Two versions of the widely used Axios HTTP client library were found to contain malicious code this week, following a compromise...
-
Security
/ 4 weeks agoDeepLoad Malware Uses Social Engineering to Steal Browser Data
A newly identified malware loader, dubbed DeepLoad, is being distributed through a sophisticated social engineering campaign targeting users worldwide. The campaign...
-
Security
/ 4 weeks agoChina-Linked Hackers Target Southeast Asian Government
A government organization in Southeast Asia has been targeted by three distinct threat clusters with links to China. The operation, described...
-
Security
/ 4 weeks agoRussian Malware CTRL Hijacks RDP via Phishing LNK Files
cybersecurity researchers have identified a new remote access toolkit of Russian origin being distributed through malicious Windows shortcut files. The malware,...
-
Security
/ 4 weeks agoMalicious Telnyx Versions on PyPI Hide Stealer in WAV Files
A threat actor known as TeamPCP has pushed two malicious versions of the telnyx Python package to the official software repository,...

