A spear-phishing campaign tied to the Democratic People's Republic of Korea (DPRK) uses trusted Microsoft infrastructure to ...
This video examines how malware was able to reach more than 500,000 Android smartphones through a trusted app marketplace. It outlines the sequence of events that allowed malicious software to bypass ...
North Korean-linked hackers targeted more than 3,100 IP addresses tied to AI, crypto, and finance firms using fake job interviews, security researchers said.
A new family of Android click-fraud trojans leverages TensorFlow machine learning models to automatically detect and interact ...
Just yesterday, we noted the growing threat of ransomware. Now, Jamf Threat Labs is warning that North Korean threat actors ...
North Korean hackers abuse Visual Studio Code task files in fake job projects to deploy backdoors, spyware, and crypto miners ...
Abstract: The widespread usage of Microsoft Windows has unfortunately led to a surge in malware, posing a serious threat to the security and privacy of millions of users. In response, the research ...
Experts reveal Evelyn Stealer malware abusing VS Code extensions to steal developer credentials, browser data, and ...
The Python-based information stealer SolyxImmortal uses legitimate APIs and libraries for stealthy data gathering and ...
A new self-propagating malware is on the loose and it's using WhatsApp. Acronis blows the whistle with all the details.
A new WhatsApp Web attack spreads self-propagating ZIP files containing Astaroth banking malware through trusted ...