An international law enforcement operation seized the dark web data leak site of the BlackSuit ransomware group. A banner on…
Koske is a new Linux malware designed for cryptomining, likely developed with the help of artificial intelligence. Koske is a…
New Coyote malware uses Windows UI Automation to steal banking credentials, targeting Brazilian users across 75 banks and crypto platforms.…
A new stealth backdoor has been discovered in the WordPress mu-plugins folder, granting attackers persistent access and control over compromised…
Iran-linked APT MuddyWater is deploying new DCHSpy spyware variants to target Android users amid the ongoing conflict with Israel. Lookout…
Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape KongTuke…
Japanese police released a free decryptor for Phobos and 8Base ransomware, letting victims recover files without paying ransom. Japanese authorities…
LameHug malware uses AI to create data-theft commands on infected Windows systems. Ukraine links it to the Russia-nexus APT28 group.…
UNC6148 targets SonicWall devices with Overstep malware, using a backdoor and rootkit for data theft, extortion, or ransomware. Google’s Threat…
A new Konfety Android malware variant uses a malformed ZIP and obfuscation to evade detection, posing as fake apps with…
This website uses cookies.