A new malware has been discovered that is an all-inclusive package for a keylogger, cryptocurrency stealer, and document uploader. Named BluStealer, it was first spotted by...
A new Mac malware, named ZuRu, has been detected spreading via poisoned search engine results in China via Baidu. The criminals masquerade as iTerm2, which is...
Cloud apps are now the most common way digital attackers distribute malware. In the second quarter of 2021, researchers found that 68% of malware downloads originated...
After news of REvil’s rip-off-the-affiliates backdoor & double chats, affiliates fumed, reiterating prior claims against the gang in “Hackers Court.” A day after news broke about...
Spanish authorities are warning of a phishing campaign that impersonates messaging service WhatsApp in an attempt to trick recipients into downloading a trojan. Recipients are being urged to...
Google researchers spotted malware developers creating malformed code signatures seen as valid in Windows to bypass security software. This tactic is actively used to push OpenSUpdater,...
Despite the cliche image of the hooded hacker ensconced in an underground base, furiously breaking through firewalls and other digital security mechanisms, the reality of cybercrime...
Russian state-sponsored hackers known as the Turla APT group have been using new malware over the past year that acted as a secondary persistence method on...
Recently, the PYSA ransomware gang expanded its attack portfolio by adding support to Linux-based systems. Experts noted a Linux version of ChaChi on VirusTotal. ChaChi is...
Once dismissed proof-of-concept attack on Microsoft OS through WSL detected in the wild Linux binaries have been found trying to take over Windows systems in what...