Active malware exploits DLL side-loading in a signed GitKraken binary to deliver trojans, stealers, and remote access malware ...
Windows has always been a favorite target for hackers, but it seems they have now figured out how to actively target Macs as well. We've seen an alarming rise in malware affecting Mac computers, ...
Cisco Talos reports China-linked UAT-7290 spying on telecoms since 2022 using Linux malware, edge exploits, and ORB ...
Discover how crypto malware operates through cryptojacking and ransomware, with real-world examples such as WannaMine and PowerGhost ...
Crypto exploits had a record year in 2025, taking away $4.04B, up from around $3B in 2024. DeFi and Web3 hacks accelerated in ...
ESET researchers have recently discovered a new Linux backdoor, named WolfsBane, that is being used by the China-aligned Gelsemium APT group. This is the first known instance of Gelsemium using Linux ...
A new malware variant dubbed RESURGE has been uncovered by the US Cybersecurity and Infrastructure Security Agency (CISA) and is targeting Ivanti Connect Secure appliances through a critical ...
Android Malware Exploits a Microsoft-Related Security Blind Spot to Avoid Detection Your email has been sent .NET MAUI’s hidden danger Bypassing security Malware’s evolving tactics The blob advantage ...
Cybersecurity firm Kaspersky has detailed more of its findings on the distribution of malware through a zero-day exploit it uncovered in Google Chrome earlier this year. The exploit was executed ...
New malware called Styx Stealer has been uncovered by cybersecurity solutions provider Check Point Research. The newly discovered malware can steal a vast array of material, including cryptocurrency, ...
A sophisticated threat actor that uses Linux-based malware to target telecommunications providers has recently broadened its ...