Russian state-sponsored hackers known as the Turla APT group have been using new malware over the past year that acted as a secondary persistence method on...
Recently, the PYSA ransomware gang expanded its attack portfolio by adding support to Linux-based systems. Experts noted a Linux version of ChaChi on VirusTotal. ChaChi is...
Once dismissed proof-of-concept attack on Microsoft OS through WSL detected in the wild Linux binaries have been found trying to take over Windows systems in what...
Medical tech multinational Olympus has sought to reassure customers that its services are running normally following a cyber-attack that prompted the shutdown of certain IT systems last week....
Cybersecurity firm CrowdStrike tracked record levels of cyber intrusion activity over the past year. Adversaries are relying less on malware to conduct attacks that are consequently...
A new malware family has been discovered that uses Common Log File System (CLFS) to stay undetected. Named PRIVATELOG, this malware uses another malware—StashLog—as its installer. What’s...
Hackers are entrepreneurs. After legitimate developers built software-as-a-service (SaaS) businesses by renting access to productivity software, cybercriminals seeking new revenue streams created malware-as-a-service (MaaS) as a...
An ongoing campaign has been found to leverage a network of websites acting as a “dropper as a service” to deliver a bundle of malware payloads...
A detailed analytical report by a security firm revealed the technical aspects of QakBot, a decade-old banking Trojan. Active since 2007, it has continued to claim...
Cybercriminals are now offering a method to hide and execute malicious codes from the GPU. Recently, a post was spotted on a hacker forum where someone...