The WebRAT malware is now being distributed through GitHub repositories that claim to host proof-of-concept exploits for ...
Cybersecurity researchers Kaspersky said they found 15 malicious repositories hosted on GitHub. These repositories, apparently crafted with the help of Generative Artificial Intelligence (Gen AI), ...
A RunDLL error occurs when a DLL file that is needed to start with a program, run at startup, or set up as a scheduled task fails to start. Windows tries to load this ...
ESET researchers discovered a China-aligned APT group, LongNosedGoblin, which uses Group Policy to deploy cyberespionage ...
An initial access broker tracked as Storm-0249 is abusing endpoint detection and response solutions and trusted Microsoft Windows utilities to load malware, establish communication, and persistence in ...
ESET researchers provide a comprehensive analysis and assessment of a critical severity vulnerability with low likelihood of ...
Iranian APT Infy resurfaced after years of silence, using updated Foudre & Tonnerre malware, phishing delivery, resilient C2 ...
Researchers report phishing emails in Russia using ISO attachments to deploy Phantom Stealer against finance and related ...
The initial access broker has been weaponizing endpoint detection and response (EDR) platforms and Windows utilities in recent high-precision attacks.
A Singapore entrepreneur loses $14,189 in crypto—his entire portfolio—after downloading malware disguised as a game beta test ...
Once considered dormant, the threat group has been quite active in evolving its techniques and tools, with updated malware ...
A new, modular infostealer called SantaStealer, advertised on Telegram with a basic tier priced at $175 per month, promises ...