We talk about all the newest threats, malware strains, and cybersecurity events related to malware in this category. Keep up with new malware methods, attack vectors, and the best ways to find and stop malware. Our reporting shows how malware changes over time and how it affects the safety of systems and data.
Researchers discovered a malware campaign targeting the npm ecosystem, distributing the Skuld info stealer through malicious packages disguised as legitimate…
An investigation revealed an intrusion in Asia involving the BellaCiao .NET malware, as the initial sample (MD5 14f6c034af7322156e62a6c961106a8c) provided valuable…
The Lazarus Group has recently employed a sophisticated attack, dubbed "Operation DreamJob," to target employees in critical sectors like nuclear…
NodeStealer, initially a JavaScript-based malware, has evolved into a more sophisticated Python-based threat that targets Facebook Ads Manager accounts, stealing…
Cybersecurity threats are increasingly targeting vulnerabilities in publicly exposed assets like VPNs and firewalls, exploited by various actors, including APT…
A new malware variant called Nunu Stealer is making headlines after being advertised on underground hacker forums and Telegram channels. Priced at…
Through the use of XLoader and impersonating SharePoint notifications, researchers were able to identify a sophisticated malware delivery campaign. A…
Researchers have identified a rise in malicious activity on the VSCode Marketplace, highlighting the vulnerability of the platform to supply…
TA397, also known as Bitter, targeted a Turkish defense organization with a spearphishing email containing a RAR archive, which included…
BADBOX is a cybercriminal operation infecting Android devices like TV boxes and smartphones with malware before sale, which are often…