Malware actors leverage popular platforms like YouTube and social media to distribute fake installers. Reputable file hosting services are abused…
The QSC Loader service DLL named "loader.dll" leverages two distinct methods to obtain the path to the Core module code.…
FireScam is multi-stage malware disguised as a fake “Telegram Premium” app that steals data and maintains persistence on compromised devices…
The Tycoon 2FA platform is a Phishing-as-a-Service (PhaaS) tool that enables cybercriminals to easily launch sophisticated phishing attacks targeting two-factor…
Cybersecurity threats are increasingly targeting vulnerabilities in publicly exposed assets like VPNs and firewalls, exploited by various actors, including APT…
Researchers identified a threat actor leveraging Google Search ads to target graphic design professionals, as the actor has launched at…
Wuhan Chinasoft Token Information Technology Co., Ltd. developed EagleMsgSpy, a surveillance tool operational since 2017, which, installed as an APK,…
Researchers analyzed a malicious Android sample created using Spynote RAT, targeting high-value assets in Southern Asia, which, likely deployed by…
In a resurgence since May 2024, the Black Basta ransomware campaign has exhibited a troubling escalation in its attack methods,…
Cloudflare Pages, a popular web deployment platform, is exploited by threat actors to host phishing sites, as attackers leverage Cloudflare's…