New Attack Campaign Exploits Microsoft Signature Verification
The Malsmoke attack group is behind a campaign that has exploited the Microsoft e-signature verification tool to target 2,100 victims.
The Malsmoke attack group is behind a campaign that has exploited the Microsoft e-signature verification tool to target 2,100 victims.
A new Zloader campaign exploits Microsoft's e-signature code verification to steal user credentials from over two thousand victims in 111…
A laced Telegram for desktop installer was spotted distributing the Purple Fox malware while disabling the UAC on the infected…
Security researchers have uncovered a malicious campaign that relies on a valid code-signing certificate to disguise malicious code as legitimate…
Threat actors now exploit the critical Apache Log4j vulnerability named Log4Shell to infect vulnerable devices with the notorious Dridex banking…
A new malware named 'DarkWatchman' has emerged in the cybercrime underground, and it's a lightweight and highly-capable JavaScript RAT (Remote…
Cybercriminals are spamming website contact forms and discussion forums to distribute Excel XLL files that download and install the RedLine…
The notorious Emotet malware is now distributed through malicious Windows App Installer packages that pretend to be Adobe PDF software.…
A newly discovered Iranian threat actor is stealing Google and Instagram credentials belonging to Farsi-speaking targets worldwide using a new…
The Emotet malware kicked into action yesterday after a ten-month hiatus with multiple spam campaigns delivering malicious documents to mailboxes…