We talk about all the newest threats, malware strains, and cybersecurity events related to malware in this category. Keep up with new malware methods, attack vectors, and the best ways to find and stop malware. Our reporting shows how malware changes over time and how it affects the safety of systems and data.
Security researchers Dylan Tran and Jimmy Bayne have unveiled a new fileless lateral movement technique that exploits trapped Component Object…
A new malware strain called IOCONTROL has emerged, posing a significant threat to Internet of Things (IoT) devices and operational…
A new wave of cyberattacks is targeting YouTube creators, leveraging fake brand collaboration offers to distribute malware. Cybersecurity firm CloudSEK…
In a significant development, cybersecurity firm Silent Push has identified nearly 200 unique command and control (C2) domains associated with…
In the second half of 2024, cybercriminals have increasingly leveraged legitimate Microsoft tools and browser extensions to bypass security measures…
In 2024, the number of users affected by mobile banking malware skyrocketed to nearly 248,000, a staggering 3.6-fold increase from…
Security researcher Nick Cerne from Bishop Fox has published findings comparing malware development in Rust versus traditional C/C++ languages. The…
CAPE, derived from Cuckoo v1, is a sophisticated malware sandbox designed to execute malicious files in an isolated environment while…
SnakeKeylogger, a sophisticated multistage malware, has emerged as a significant threat to both individuals and businesses by targeting sensitive login…
A recent discovery by the McAfee Mobile Research Team has highlighted a new wave of Android malware campaigns that utilize…