News

Newly published research shows that the domain name system—a fundamental part of the web—can be exploited to hide malicious ...
Researchers have known for almost a decade that threat actors sometimes use DNS records to host malicious PowerShell scripts.
By using scripting tools, threat actors query the DNS records and reconstruct the malware without triggering the usual ...
Security researchers are warning about an ongoing campaign leveraging Microsoft Teams calls to deploy a piece of malware called Matanbuchus 3.0. As per cybersec outfit Morphisec, an unidentified ...
Malicious notifications are one of the most common ways that malware can appear on someone's phone, and the most sinister ...
A new variant of the Konfety Android malware emerged with a malformed ZIP structure along with other obfuscation methods that ...
A threat actor that may be financially motivated is targeting SonicWall devices with a backdoor and user-mode rootkit.
Uploading malicious code to npm is just a setup. The real attack most likely happens elsewhere - on LinkedIn, Telegram, or ...
North Korean threat actors planted 67 malicious packages in the Node Package Manager (npm) online repository to deliver a new ...
SparkKitty, a powerful mobile malware strain that scans private photos to steal cryptocurrency recovery phrases and other ...
A new ClickFix campaign targets macOS users with fake Spectrum support sites, tricking victims with CAPTCHA failures to paste ...
North Korean threat actors escalated their software supply chain attacks by uploading 67 new malicious packages to the npm ...