Wednesday, March 26, 2025

Malware

Raspberry Robin Unveils 200 Unique Domains Used by Threat Actors

In a significant development, cybersecurity firm Silent Push has identified nearly 200 unique command and control (C2) domains associated with the Raspberry Robin malware.This discovery sheds new light...

Cybercriminals Bypass Security Using Legitimate Tools & Browser Extensions to Deliver Malware

In the second half of 2024, cybercriminals have increasingly leveraged legitimate Microsoft tools and browser extensions to bypass security measures and deliver malware, according...

Banking Malware Infects 248,000 Mobile Users Through Social Engineering Techniques

In 2024, the number of users affected by mobile banking malware skyrocketed to nearly 248,000, a staggering 3.6-fold increase from the previous year's 69,000...

Researchers Compare Malware Development in Rust vs C and C++

Security researcher Nick Cerne from Bishop Fox has published findings comparing malware development in Rust versus traditional C/C++ languages.The research demonstrates how Rust...

CAPE from Cuckoo v1 Enables Malware Analysis in a Secure Isolated Sandbox Environment

CAPE, derived from Cuckoo v1, is a sophisticated malware sandbox designed to execute malicious files in an isolated environment while capturing their dynamic behavior...

Multistage Info-Stealer SnakeKeylogger Targets Individuals and Businesses to Steal Login Credentials

SnakeKeylogger, a sophisticated multistage malware, has emerged as a significant threat to both individuals and businesses by targeting sensitive login credentials.This malware campaign...

New Malware Targets Android Users by Abusing Cross-Platform Framework for Evasion

A recent discovery by the McAfee Mobile Research Team has highlighted a new wave of Android malware campaigns that utilize the .NET MAUI cross-platform...

Rilide Malware Poses as Browser Extension to Steal Login Credentials from Chrome and Edge Users

Rilide, a sophisticated malware, has been masquerading as a legitimate browser extension to steal sensitive information from users of Chromium-based browsers like Google Chrome...

Beware Developers – Fake Coding Challenges Will Deploy FogDoor on Your System

Researchers has discovered a sophisticated malware operation that poses as a fake coding challenge and targets Polish-speaking professionals.This campaign, known as "FizzBuzz to FogDoor,"...

New Rust-Based Linux Kernel Module Unveiled to Detect Rootkits

A recent development in Linux kernel security has led to the creation of a Rust-based kernel module designed to detect rootkits, a type of...

SvcStealer Malware Strikes, Harvesting Sensitive Data from Browsers and Applications

A new strain of malware, known as SvcStealer, has emerged as a significant threat in the cybersecurity landscape.This malware is primarily delivered through...