News

Researchers have known for almost a decade that threat actors sometimes use DNS records to host malicious PowerShell scripts.
A new Black Hat presentation using an open source language model could represent a giant leap forward for easy Windows ...
There are other ways Konfety tries to hide and maintain persistence. zLabs said that the attackers are also using so-called ...
A new variant of the Konfety Android malware emerged with a malformed ZIP structure along with other obfuscation methods that ...
North Korean threat actors planted 67 malicious packages in the Node Package Manager (npm) online repository to deliver a new ...
A threat actor that may be financially motivated is targeting SonicWall devices with a backdoor and user-mode rootkit.
Gravity Forms is a premium WordPress plugin enabling users to build different forms using a drag-and-drop interface. It ...
Researchers uncover sophisticated Konfety Android malware using evil twin apps and complex evasion methods to conduct ad fraud.
Uploading malicious code to npm is just a setup. The real attack most likely happens elsewhere - on LinkedIn, Telegram, or ...
Malcure Malware Scanner plugin contains an unpatched high-severity vulnerability. Temporarily shut down at WordPress ...
From there, you want to make sure that Google Play Protect is enabled on your Android phone. This pre-installed security app scans all of your existing apps and any new ones you download for malware.
A new state-backed campaign using HazyBeacon malware targets Southeast Asian governments to collect sensitive data via AWS ...