Tens of thousands of users have installed GhostPoster Firefox extensions, which rely on steganography to hide malware in their logo files.
French intelligence agencies uncovered what appears to be a coordinated foreign interference operation targeting the GNV ...
The text and code editing tool EmEditor was targeted in a supply chain attack that resulted in the distribution of ...
The ClickFix campaign disguises malware as legitimate Windows updates, using steganography to hide shellcode in PNG files and bypass security detection systems.
Shai Hulud is a malware campaign first observed in September targeting the JavaScript ecosystem that focuses on supply chain ...
A newly discovered third variant of the Shai Hulud malware is raising fresh concerns about the security of the open-source software supply chain, as researchers warn that the latest version shows more ...
Android attackers use fake apps and droppers to spread the Wonderland SMS stealer, stealing OTPs, SMS data, and bank funds, ...
Blind Eagle launches new multi-stage malware attacks via spear-phishing to compromise systems and deploy memory-resident ...
Ukraine has been hit by another major cyberattack. In March, hackers targeted government agencies and key services in three serious incidents. They used a new type of harmful software called ...
Law enforcement agencies have warned federal, state and local authorities to keep an eye on their use of Android mobile devices as attacks on the phones' operating system increase dramatically. An ...
The landscape of malware analysis has significantly evolved, driven by the increasing sophistication of cyber threats and the advanced techniques being developed to combat them. Malware attacks on US ...
Forbes contributors publish independent expert analyses and insights. Davey Winder is a veteran cybersecurity writer, hacker and analyst. Tesla has undoubtedly been in the news a lot since Elon Musk ...