Cloud and computer security leader Netskope reports that phishing downloads have increased 450% over the past 12 months. Cybercriminals are getting creative and taking on more sophisticated approaches ...
The decades-old "finger" command is making a comeback,, with threat actors using the protocol to retrieve remote commands to ...
Avast! Virus Lab has discovered a dirty trick that cybercriminals are using to encode malware exploits and payloads into PDF files. Adobe says that the this trick has been used in a relatively small ...
Google has warned that AI-powered malware is circulating that is virulent and harder to detect than most malware. Here's why, ...
A new remote administration tool (RAT) weaponizing Microsoft Office and Adobe PDF documents to deliver malicious code was spotted in dark web forums and Telegram channels. The malware was discovered ...
Microsoft Word also leveraged in the email campaign, which uses a 22-year-old Office RCE bug. While most malicious e-mail campaigns use Word documents to hide and spread malware, a recently discovered ...
A new class of adaptive malware called PROMPTFLUX — capable of mutating its own code via LLMs - represents a major escalation in cyber-threats, according to Google’s GTIG.
New Mac Malware, Possibly From North Korea, Masquerades as PDF Viewer The attack arrives through a functioning PDF viewer app, according to security firm Jamf. The app can then become malicious when ...
Google LLC’s TAG research team, which tracks state-backed hacking groups, has disrupted a malware campaign launched by a Russian threat actor. The search giant detailed the operation in a blog post ...
Software supply chain management firm Sonatype Inc. today said it found a sharp rise in malicious activity targeting software developers and supply chains in the second quarter. The company’s Q2 2025 ...
The Pakistani APT36 cyberspies are using Linux .desktop files to load malware in new attacks against government and defense entities in India. Although the attacks described in the two reports use ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results