Cloud and computer security leader Netskope reports that phishing downloads have increased 450% over the past 12 months. Cybercriminals are getting creative and taking on more sophisticated approaches ...
The decades-old "finger" command is making a comeback,, with threat actors using the protocol to retrieve remote commands to ...
Avast! Virus Lab has discovered a dirty trick that cybercriminals are using to encode malware exploits and payloads into PDF files. Adobe says that the this trick has been used in a relatively small ...
A new remote administration tool (RAT) weaponizing Microsoft Office and Adobe PDF documents to deliver malicious code was spotted in dark web forums and Telegram channels. The malware was discovered ...
Google has warned that AI-powered malware is circulating that is virulent and harder to detect than most malware. Here's why, ...
Microsoft Word also leveraged in the email campaign, which uses a 22-year-old Office RCE bug. While most malicious e-mail campaigns use Word documents to hide and spread malware, a recently discovered ...
The Gozi Trojan, a bot that fronted a sophisticated hacking subscription service earlier last year, was found again in the wild today infecting PCs at a healthy clip through the use of PDF spam. But, ...
New Mac Malware, Possibly From North Korea, Masquerades as PDF Viewer The attack arrives through a functioning PDF viewer app, according to security firm Jamf. The app can then become malicious when ...
NASA’s Jet Propulsion Laboratory is well known for landing rovers on Mars, exploring the solar system with robotic probes, and developing sensitive science instruments that observe Earth and other ...
Google LLC’s TAG research team, which tracks state-backed hacking groups, has disrupted a malware campaign launched by a Russian threat actor. The search giant detailed the operation in a blog post ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results