We talk about all the newest information about cyber crime in this section. This includes new threats, infections, and strikes. How hackers work, what they do, and how it affects companies and people are some of the things we talk about. Remember to keep up with how cyber crime is changing and what is being done to protect yourself from digital risks.
A recent campaign dubbed FLUX#CONSOLE has come to light, leveraging Microsoft Common Console Document (.MSC) files to infiltrate systems with backdoor malware.…
Researchers have discovered a new Android banking trojan targeting Indian users, and this malware disguises itself as essential utility services…
Bulletproof hosting services, a type of dark internet service provider, offer infrastructure to cybercriminals, facilitating malicious activities like malware distribution,…
The Federal Bureau of Investigation (FBI) announced the seizure of Rydox, an illicit online marketplace that facilitated the buying and…
Researchers identified FUNNULL, a Chinese CDN, as hosting malicious content, which includes fake trading apps for financial fraud, gambling sites…
Wuhan Chinasoft Token Information Technology Co., Ltd. developed EagleMsgSpy, a surveillance tool operational since 2017, which, installed as an APK,…
Attackers are distributing a malicious .NET-based HPDxLIB activator disguised as a new version, which is signed with a self-signed certificate,…
Researchers discovered Celestial Stealer, a JavaScript-based MaaS infostealer targeting Windows systems that, evading detection with obfuscation and anti-analysis techniques, steals…
In a new wave of cyberattacks, the Russia-aligned hacking group "RomCom" has been found exploiting critical zero-day vulnerabilities in Microsoft…
CyberVolk, a politically motivated hacktivist group, has leveraged readily available ransomware builders like AzzaSec, Diamond, LockBit, and Chaos to launch…