Items tagged with Malware

The Satori Threat Intelligence and Research Team at Human Security have discovered an ad and click fraud campaign dubbed SlopAds. The operation resulted in over 224 apps that have been downloaded 38 million times in 228 countries. It was a... Read more...
Security researchers at ESET have discovered a new threat actor in the constantly evolving cybersecurity space. The hacker group, dubbed GhostRedirector, has been attacking Windows servers using novel, custom tools. Apparently, this... Read more...
Android users are currently at risk of a scarily advanced malware that reportedly uses Meta's advertising platforms (like Facebook and Instagram) to hunt for users' PINs, messages, and other sensitive data. The malware which has been... Read more...
As was shown in a recent report about a vicious cyber attack that targeted kidney failure patients, cyber criminals show no mercy. Now a new report from Microsoft has revealed a growing deployment of ClickFix social engineering tactics by... Read more...
Since last year, Atomic Stealer has been on the rampage, gaining notoriety as a formidable weapon for exfiltrating sensitive data from MacBook users. A recent report has revealed that this info stealer has evolved into an even more... Read more...
Crocodilus, a relatively new banking trojan targeting Android devices, is continuing to evolve since it was first spotted back in March by the Mobile Threat Intelligence team at Threat Fabric. The improvements aim to make the malware... Read more...
Microsoft has sounded the alarm on a pervasive piece of malware that has already infected hundreds of thousands of PCs. A few weeks ago, we reported on the Clop gang's involvement in the large-scale data leaks at Hertz. This time... Read more...
In a disturbing revelation that highlights the evolving nature of cyber threats, a YouTuber uncovered a significant security lapse where a printer manufacturer inadvertently distributed malware-laced software to its customers for at least... Read more...
Modern AI is far from science-fiction AGI, and yet it can still be an incredibly powerful tool. Like any tool, if misused, it can pose a threat to legitimate users, like how we recently covered photographers' concerns that Google's Gemini... Read more...
A few weeks ago, we reported a study alleging that CAPTCHA does not deter bots and that Google merely uses it to collect and sell data. This week, HP Wolf Security researchers have launched a new complaint against CAPTCHA in the latest... Read more...
You probably have experienced situations where you needed to convert files from one format to another. In these cases, free online file converters are a common solution. However, the FBI Denver Field Office has just taken to X (formerly... Read more...
Microsoft has uncovered a large-scale malvertising campaign that has affected over 1 million devices worldwide. In a blog post detailing its findings, Microsoft revealed that threat actors used platforms such as Dropbox, Discord, and... Read more...
Imagine you're having a good time enjoying your favorite TV show, and suddenly an adult video takes over your screen, your remote stops working and harmful content is being forced on viewers. While you might dismiss this as mere fantasy... Read more...
Are you using or planning to use a phone monitoring and tracking spyware application? If yes, you need to be aware of a new malware in the wild that compromises smartphones through a specific group of phone monitoring applications. The... Read more...
Discovered in 2020, the XCSSET malware gained notoriety for granting cybercriminals remote access to developers' MacBooks. While this discovery led to improved macOS protection strategies, Microsoft Threat Intelligence has recently... Read more...
Phishing attacks continue to surge, with estimates indicating over 800,000 victims in the first quarter of 2024, a 4% rise from the same period the previous year. Attackers persistently try to deceive individuals into revealing their... Read more...
Malware on iPhones and Android devices is often associated with downloading third-party apps from unofficial sources. Cybercriminals, however, are also able to hide malware within apps found at official sources, like the iOS App Store and... Read more...
Many people believe MacBooks are impervious to malware. While strong security measures such as Xprotect, Gatekeeper, and Sandboxing are in place on macOS, they do not offer foolproof protection. Case in point: Cyber security tech giant... Read more...
Beware of those Google Calendar invites as they could lead to a world of hurt if you accept them haphazardly. Security researchers at Check Point warn that cyber criminals are exploiting user-friendly features in Google Calendar to try and... Read more...
Security researchers at Any.Run have found a new zero-day attack currently being used by threat actors to evade detection tools used by security professionals. This new technique “evades antivirus software, prevents uploads to sandboxes... Read more...
Security researchers at Kaspersky have discovered malware, dubbed SteelFox, which has been spreading “via forums posts, torrent trackers and blogs” since February of last year. It’s a potent piece of malicious software that attackers can... Read more...
In what feels like a serious case of déjà vu, a piece of Android malware initially discovered two years ago, and spotted this time by cybersecurity firm Zimperium, is making the rounds again with a new version sporting several alarming... Read more...
1 2 3 4 5 Next