A new Android click-fraud trojan family uses TensorFlow ML to visually detect and tap ads, bypassing traditional script-based click techniques.…
VoidLink is a cloud-focused Linux malware, likely built by one person using AI, offering loaders, implants, rootkit evasion, and modular…
Threat actors use PDFSIDER malware with social engineering and DLL sideloading to bypass AV/EDR, and ransomware gangs already abuse it.…
Ingram Micro says a ransomware attack exposed personal data of about 42,000 people, including names, birth dates, SSNs, and job-related…
Researchers uncovered an XSS flaw in StealC malware’s control panel, exposing key details about a threat actor using the info…
GootLoader malware uses malformed ZIP files made of hundreds of concatenated archives to evade detection. GootLoader is used by ransomware…
Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape Malware…
A new round of the weekly Security Affairs newsletter has arrived! Every week, the best security articles from Security Affairs…
Police in Ukraine and Germany identified Black Basta suspects and issued an international wanted notice for the group’s alleged Russian…
South Korean conglomerate Kyowon confirmed a ransomware attack that disrupted operations and may have exposed customer data. Kyowon Group is…
This website uses cookies.