The WebRAT malware is now being distributed through GitHub repositories that claim to host proof-of-concept exploits for ...
ESET researchers provide a comprehensive analysis and assessment of a critical severity vulnerability with low likelihood of ...
Hackers are exploiting a new, undocumented vulnerability in the implementation of the cryptographic algorithm present in Gladinet's CentreStack and Triofox products for secure remote file access and ...
Cybersecurity researchers Kaspersky said they found 15 malicious repositories hosted on GitHub. These repositories, apparently crafted with the help of Generative Artificial Intelligence (Gen AI), ...
ESET researchers discovered a China-aligned APT group, LongNosedGoblin, which uses Group Policy to deploy cyberespionage ...
The known RAT aimed at gamers is now targeting security professionals searching GitHub for PoCs and exploit codes.
Researchers report phishing emails in Russia using ISO attachments to deploy Phantom Stealer against finance and related ...
ESET researchers offer a deep dive analysis of the CVE 2025 50165 vulnerability and provide their method to reproduce the crash using a simple 12-bit or 16-bit JPG image, and an examination of the ...
A new phishing campaign has been identified, delivering the Phantom information-stealing malware via an ISO attachment ...
A new, modular infostealer called SantaStealer, advertised on Telegram with a basic tier priced at $175 per month, promises ...
Researchers uncover malware campaigns using cracked software and compromised YouTube videos to deliver CountLoader, ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results