News
Researchers have known for almost a decade that threat actors sometimes use DNS records to host malicious PowerShell scripts.
A new Black Hat presentation using an open source language model could represent a giant leap forward for easy Windows ...
There are other ways Konfety tries to hide and maintain persistence. zLabs said that the attackers are also using so-called ...
A new variant of the Konfety Android malware emerged with a malformed ZIP structure along with other obfuscation methods that ...
North Korean threat actors planted 67 malicious packages in the Node Package Manager (npm) online repository to deliver a new ...
A threat actor that may be financially motivated is targeting SonicWall devices with a backdoor and user-mode rootkit.
Explore more
Gravity Forms is a premium WordPress plugin enabling users to build different forms using a drag-and-drop interface. It ...
Researchers uncover sophisticated Konfety Android malware using evil twin apps and complex evasion methods to conduct ad fraud.
Uploading malicious code to npm is just a setup. The real attack most likely happens elsewhere - on LinkedIn, Telegram, or ...
Malcure Malware Scanner plugin contains an unpatched high-severity vulnerability. Temporarily shut down at WordPress ...
From there, you want to make sure that Google Play Protect is enabled on your Android phone. This pre-installed security app scans all of your existing apps and any new ones you download for malware.
A new state-backed campaign using HazyBeacon malware targets Southeast Asian governments to collect sensitive data via AWS ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results