In the intricate landscape of cybersecurity, comprehending the various forms of malware is crucial. This article offers an in-depth look…
A new DLL (Dynamic Link Library) Search Order Hijacking variant emerged. This method capitalizes on executables in the trusted WinSxS…
Microsoft reportedly disabled MSIX installer protocol in Windows, due to its exploitation in real-world cyberattacks. Hackers found a way to…
The threat landscape meets a new player – Rugmi Loader. This threat specializes in spreading spyware, and is in fact…
A new Android backdoor, dubbed Xamalicious, was discovered by the researchers at the edge of 2023. This malware exhibits potent…
Sentinel One has discovered that the North Korean hacker group…
Ukrainian law enforcers reported that they “neutralized” and arrested hackers…
Experts from ReasonLabs have discovered an unusual malicious scheme that…
GitHub warns that a large-scale phishing campaign aimed at users…
On September 21, 2022, a new Twitter user Ali Qushji…
Cisco Talos analysts write that the Russian-speaking hack group Gamaredon…
Analysts from the Cyble company recorded an interesting phishing campaign…
Security firm Arctic Wolf has warned that Lorenz ransomware is…
The Yanluowang hack group published data stolen from Cisco back…
Wordfence analysts have discovered that a fresh 0-day vulnerability in…
A new malware campaign by the North Korean hacker group…
Experts have discovered that the MooBot botnet, built on the…