News

Malware known as a "BadBox 2.0" has infiltrated over 10 million Android devices, including TV streaming devices, tablets, and ...
The use of GitHub gave the malware-as-a-service (MaaS) a reliable and easy-to-use platform that’s greenlit in many enterprise ...
Newly published research shows that the domain name system—a fundamental part of the web—can be exploited to hide malicious ...
Researchers have known for almost a decade that threat actors sometimes use DNS records to host malicious PowerShell scripts.
A new Black Hat presentation using an open source language model could represent a giant leap forward for easy Windows ...
Recent attacks by the state-run cyberespionage group against Ukrainian government targets included malware capable of ...
The Matanbuchus malware loader has been seen being distributed through social engineering over Microsoft Teams calls ...
A novel malware family named LameHug is using a large language model (LLM) to generate commands to be executed on compromised ...
Security researchers are warning about an ongoing campaign leveraging Microsoft Teams calls to deploy a piece of malware ...
Google is suing the cybercriminals behind BadBox 2.0, a massive Android malware scheme that turned millions of cheap devices into a botnet.
Ukraine’s CERT-UA has identified a new AI-powered malware, dubbed “LameHug,” which executes commands on compromised Windows ...
Amid a new round of UK government sanctions targeting Moscow's intelligence apparatus, the NCSC has formally attributed attacks orchestrated with a cleverly-designed malware to the GRU's Fancy Bear cy ...