Medical tech multinational Olympus has sought to reassure customers that its services are running normally following a cyber-attack that prompted the shutdown of certain IT systems last week....
Cybersecurity firm CrowdStrike tracked record levels of cyber intrusion activity over the past year. Adversaries are relying less on malware to conduct attacks that are consequently...
A new malware family has been discovered that uses Common Log File System (CLFS) to stay undetected. Named PRIVATELOG, this malware uses another malware—StashLog—as its installer. What’s...
Hackers are entrepreneurs. After legitimate developers built software-as-a-service (SaaS) businesses by renting access to productivity software, cybercriminals seeking new revenue streams created malware-as-a-service (MaaS) as a...
An ongoing campaign has been found to leverage a network of websites acting as a “dropper as a service” to deliver a bundle of malware payloads...
A detailed analytical report by a security firm revealed the technical aspects of QakBot, a decade-old banking Trojan. Active since 2007, it has continued to claim...
Cybercriminals are now offering a method to hide and execute malicious codes from the GPU. Recently, a post was spotted on a hacker forum where someone...
Relying on a simple recipe that has proved successful time and time again, threat actors have deployed a malware campaign recently that used a Windows 11...
Clipboard malware was developed with the sole purpose of stealing cryptocurrency. The parents of two teenagers allegedly responsible for stealing $1 million in Bitcoin are being...
Firm offers guidance on how to mitigate a five-months-old privilege escalation bug impacting Parallels Desktop 16 for Mac and all previous versions. The makers of Parallels...