The operators behind the highly adaptable RondoDox botnet campaign that kicked off in late March have proven to be ready to embrace the latest attack trends. Most recently, in December they began ...
With Windows 10 no longer receiving support, it has become an easy target for hackers. That doesn't mean you have to upgrade ...
Eighty years after total war transformed the continent, European countries are making big bets on new instruments of ...
A new ClickFix social engineering campaign is targeting the hospitality sector in Europe, using fake Windows Blue Screen of ...
Securonix is detailing a multi-stage campaign that starts with a bogus Booking.com message that runs through a ClickFix technique and a fake Blue Screen of Death before dropping the DCRat malware that ...
A researcher demonstrates how Hinge profile photos and prompts can be exploited as a stealthy malware command-and-control ...
A new wave of the GlassWorm malware is now targeting macOS developers by hiding malicious code inside fake Visual Studio Code ...
Transparent Tribe (APT36) is linked to new cyber-espionage attacks using malicious LNK files, adaptive RATs, and long-term ...
RondoDox botnet exploited React2Shell to compromise IoT devices and Next.js servers over a nine-month global campaign.
Nagpur: That seemingly harmless wedding invitation popping up on your mobile phone may be far more dangerous than it appears.
RondoDox botnet exploits the React2Shell vulnerability in Next.js, with over 90,000 exposed systems used to deploy miners and ...
Kaspersky has released new research findings on a sophisticated cyber espionage campaign by the Evasive Panda threat actor.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results