News

Researchers have known for almost a decade that threat actors sometimes use DNS records to host malicious PowerShell scripts.
A new Black Hat presentation using an open source language model could represent a giant leap forward for easy Windows ...
A new variant of the Konfety Android malware emerged with a malformed ZIP structure along with other obfuscation methods that ...
North Korean threat actors planted 67 malicious packages in the Node Package Manager (npm) online repository to deliver a new ...
A threat actor that may be financially motivated is targeting SonicWall devices with a backdoor and user-mode rootkit.
Gravity Forms is a premium WordPress plugin enabling users to build different forms using a drag-and-drop interface. It ...
Researchers uncover sophisticated Konfety Android malware using evil twin apps and complex evasion methods to conduct ad fraud.
Mobile security company Lookout found a new malware/spyware system that Chinese police departments use to extract data from ...
Researchers warned that Chinese residents, and visitors to China, should be aware of the tool's existence and the risks it ...
Discover how AsyncRAT evolved from GitHub release to a widespread malware tool, spawning dangerous variants like DCRat and ...
Uploading malicious code to npm is just a setup. The real attack most likely happens elsewhere - on LinkedIn, Telegram, or ...
Malcure Malware Scanner plugin contains an unpatched high-severity vulnerability. Temporarily shut down at WordPress ...