A researcher demonstrates how Hinge profile photos and prompts can be exploited as a stealthy malware command-and-control ...
Detected by Check Point researchers, VoidLink is a sophisticated malware framework that can be used to implant malware in the ...
An international law enforcement operation code-named 'Synergia' has taken down over 1,300 command and control servers used in ransomware, phishing, and malware campaigns. Command and control servers ...
An advanced persistent threat (APT) from Pakistan is using an old Linux bug and cheeky Discord-based malware to perform cyber espionage against Indian government organizations. Add to the pile UTA0137 ...
A new ClickFix social engineering campaign is targeting the hospitality sector in Europe, using fake Windows Blue Screen of ...
Thousands of machines running Linux have been infected by a malware strain that’s notable for its stealth, the number of misconfigurations it can exploit, and the breadth of malicious activities it ...
To contribute to global efforts to combat cybercrime, Kaspersky has assisted INTERPOL in its latest operation Secure that focused on disrupting infostealer threat and taking down infrastructure ...
Something rather significant happened on the Internet back in May, and it seems that someone only noticed it on September 3rd. [Youfu Zhang] dropped a note on one of the Mozilla security mailing lists ...
Researchers have unearthed Linux malware that circulated in the wild for at least two years before being identified as a credential stealer that’s installed by the exploitation of recently patched ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results