We talk about all the newest threats, malware strains, and cybersecurity events related to malware in this category. Keep up with new malware methods, attack vectors, and the best ways to find and stop malware. Our reporting shows how malware changes over time and how it affects the safety of systems and data.
The threat actors distributed malicious JS scripts disguised as legitimate business documents, primarily in ZIP archives with names like "Purchase…
APT36, a Pakistani cyber-espionage group, has recently upgraded its arsenal with ElizaRAT, a sophisticated Windows RAT that, initially detected in…
CleverSoar, a new malware installer, targets Chinese and Vietnamese users to deploy advanced tools like Winos4.0 and Nidhogg rootkit. These…
Recent research uncovered a novel crypto-jacking attack targeting the Python Package Index (PyPI), where malicious actors uploaded a legitimate-seeming cryptocurrency…
Researchers uncovered the resurgence of APT-C-01, also known as the Poison Ivy group, an advanced persistent threat organization notorious for…
A JavaScript-based malware targeting Magento eCommerce websites has been identified, which is designed to skim payment card details and activates…
UNC2465, a financially motivated threat actor, leverages the SMOKEDHAM backdoor to gain initial access to target networks, which are often…
APT-C-60 launched a phishing attack in August 2024, targeting domestic organizations with malicious emails disguised as job applications. These emails,…
The xattr command in Unix-like systems allows for the embedding of hidden metadata within files, similar to Windows ADS, known…
Fukui Prefectural Police have indicted a 15-year-old junior high school student from Saitama Prefecture for allegedly creating and distributing malware.…