DEAD#VAX campaign delivers AsyncRAT via IPFS-hosted VHD phishing files, using fileless memory injection and obfuscated ...
A new malicious campaign mixes the ClickFix method with fake CAPTCHA and a signed Microsoft Application Virtualization (App-V) script to ultimately deliver the Amatera infostealing malware.
The modular Windows RAT uses in-memory execution and live operator control to maintain persistence and exfiltrate sensitive ...
Two malware campaigns weaponize open-source software to target executives and cloud systems, combining social engineering ...
Virtual Hard Disks masquerading as PDF files are allowing hackers to sneak remote-access software through enterprise defenses.
How modern infostealers target macOS systems, leverage Python‑based stealers, and abuse trusted platforms and utilities to ...
A new threat actor called Amaranth Dragon, linked to APT41 state-sponsored Chinese operations, exploited the CVE-2025-8088 ...
A security audit found 341 malicious ClawHub skills abusing OpenClaw to spread Atomic Stealer and steal credentials on macOS ...
Three of those zero-days are security feature bypass flaws, which give attackers a way to slip past built-in protections in ...
Nitrogen ransomware’s ESXi encryptor corrupts its own public key, making file recovery impossible, even if victims pay.
A complex phishing campaign uses decentralized fake PDFs that mount virtual drives to silently install the AsyncRAT malware.
India is being targeted by multiple espionage campaigns delivered by the Pakistan-attributed Transparent Tribe (aka APT36).
Some results have been hidden because they may be inaccessible to you
Show inaccessible results