Threat actors have been using links to fake AI image and video generators to steal login credentials and browsing history from infected Windows PCs and MacsAs reported by BleepingComputer and first ...
Proofpoint researchers have observed the growing use of the ClickFix social engineering tactic, which lures people into ...
Malware is the scary boogeyman of computers, supposedly capable of destroying everything you know and love. But what does it ...
The DeepData malware framework was seen exploiting a Fortinet VPN client for Windows zero-day that remains unpatched.
Android users take notice. The new and improved "FakeCall" malware convincingly hijacks bank phone calls and redirects them ...
A hacking group that is believed to be Chinese state-sponsored has compromised two websites with ties to the Tibetan ...
Switzerland’s National Cyber Security Centre has warned of a new QR code scam in fake MeteoSwiss letters spreading Android ...
A new malicious package called 'SteelFox' mines for cryptocurrency and steals credit card data by using the "bring your own ...
To detect, observe, and analyze different types of malicious TTPs in a safe environment, we can use ANY.RUN's Interactive ...
North Korean threat actor BlueNoroff has been targeting crypto-related businesses with a new multi-stage malware for macOS ...
North Korean Lazarus Group uses extended macOS file attributes to deliver RustyAttr malware to unsuspecting users ...
The attackers are using Google's Flutter platform to make malicious crypto apps that can ultimately grant remote access to a ...