Malware

YouTube Creators Targeted by Weaponized Brand Deals Using ‘Clickflix’ Attack TacticYouTube Creators Targeted by Weaponized Brand Deals Using ‘Clickflix’ Attack Tactic

YouTube Creators Targeted by Weaponized Brand Deals Using ‘Clickflix’ Attack Tactic

A new wave of cyberattacks is targeting YouTube creators, leveraging fake brand collaboration offers to distribute malware. Cybersecurity firm CloudSEK…

4 days ago
Raspberry Robin Unveils 200 Unique Domains Used by Threat ActorsRaspberry Robin Unveils 200 Unique Domains Used by Threat Actors

Raspberry Robin Unveils 200 Unique Domains Used by Threat Actors

In a significant development, cybersecurity firm Silent Push has identified nearly 200 unique command and control (C2) domains associated with…

4 days ago
Cybercriminals Bypass Security Using Legitimate Tools & Browser Extensions to Deliver MalwareCybercriminals Bypass Security Using Legitimate Tools & Browser Extensions to Deliver Malware

Cybercriminals Bypass Security Using Legitimate Tools & Browser Extensions to Deliver Malware

In the second half of 2024, cybercriminals have increasingly leveraged legitimate Microsoft tools and browser extensions to bypass security measures…

5 days ago
Banking Malware Infects 248,000 Mobile Users Through Social Engineering TechniquesBanking Malware Infects 248,000 Mobile Users Through Social Engineering Techniques

Banking Malware Infects 248,000 Mobile Users Through Social Engineering Techniques

In 2024, the number of users affected by mobile banking malware skyrocketed to nearly 248,000, a staggering 3.6-fold increase from…

5 days ago
Researchers Compare Malware Development in Rust vs C and C++Researchers Compare Malware Development in Rust vs C and C++

Researchers Compare Malware Development in Rust vs C and C++

Security researcher Nick Cerne from Bishop Fox has published findings comparing malware development in Rust versus traditional C/C++ languages. The…

5 days ago
CAPE from Cuckoo v1 Enables Malware Analysis in a Secure Isolated Sandbox EnvironmentCAPE from Cuckoo v1 Enables Malware Analysis in a Secure Isolated Sandbox Environment

CAPE from Cuckoo v1 Enables Malware Analysis in a Secure Isolated Sandbox Environment

CAPE, derived from Cuckoo v1, is a sophisticated malware sandbox designed to execute malicious files in an isolated environment while…

5 days ago
Multistage Info-Stealer SnakeKeylogger Targets Individuals and Businesses to Steal Login CredentialsMultistage Info-Stealer SnakeKeylogger Targets Individuals and Businesses to Steal Login Credentials

Multistage Info-Stealer SnakeKeylogger Targets Individuals and Businesses to Steal Login Credentials

SnakeKeylogger, a sophisticated multistage malware, has emerged as a significant threat to both individuals and businesses by targeting sensitive login…

5 days ago
New Malware Targets Android Users by Abusing Cross-Platform Framework for EvasionNew Malware Targets Android Users by Abusing Cross-Platform Framework for Evasion

New Malware Targets Android Users by Abusing Cross-Platform Framework for Evasion

A recent discovery by the McAfee Mobile Research Team has highlighted a new wave of Android malware campaigns that utilize…

5 days ago
Rilide Malware Poses as Browser Extension to Steal Login Credentials from Chrome and Edge UsersRilide Malware Poses as Browser Extension to Steal Login Credentials from Chrome and Edge Users

Rilide Malware Poses as Browser Extension to Steal Login Credentials from Chrome and Edge Users

Rilide, a sophisticated malware, has been masquerading as a legitimate browser extension to steal sensitive information from users of Chromium-based…

5 days ago
Beware Developers – Fake Coding Challenges Will Deploy FogDoor on Your SystemBeware Developers – Fake Coding Challenges Will Deploy FogDoor on Your System

Beware Developers – Fake Coding Challenges Will Deploy FogDoor on Your System

Researchers has discovered a sophisticated malware operation that poses as a fake coding challenge and targets Polish-speaking professionals. This campaign,…

5 days ago