The WebRAT malware is now being distributed through GitHub repositories that claim to host proof-of-concept exploits for ...
Cybersecurity researchers Kaspersky said they found 15 malicious repositories hosted on GitHub. These repositories, apparently crafted with the help of Generative Artificial Intelligence (Gen AI), ...
A RunDLL error occurs when a DLL file that is needed to start with a program, run at startup, or set up as a scheduled task fails to start. Windows tries to load this ...
ESET researchers discovered a China-aligned APT group, LongNosedGoblin, which uses Group Policy to deploy cyberespionage ...
An initial access broker tracked as Storm-0249 is abusing endpoint detection and response solutions and trusted Microsoft Windows utilities to load malware, establish communication, and persistence in ...
ESET researchers provide a comprehensive analysis and assessment of a critical severity vulnerability with low likelihood of ...
Iranian APT Infy resurfaced after years of silence, using updated Foudre & Tonnerre malware, phishing delivery, resilient C2 ...
Researchers report phishing emails in Russia using ISO attachments to deploy Phantom Stealer against finance and related ...
A Singapore entrepreneur loses $14,189 in crypto—his entire portfolio—after downloading malware disguised as a game beta test ...
Once considered dormant, the threat group has been quite active in evolving its techniques and tools, with updated malware ...
A new, modular infostealer called SantaStealer, advertised on Telegram with a basic tier priced at $175 per month, promises ...
Hamas's best hackers have been maturing, building better malware, and spreading their attacks more widely across the region.