Novel phishing campaign uses corrupted Word documents to evade security
A novel phishing attack abuses Microsoft's Word file recovery feature by sending corrupted Word documents as email attachments, allowing them…
A novel phishing attack abuses Microsoft's Word file recovery feature by sending corrupted Word documents as email attachments, allowing them…
A new set of 15 SpyLoan Android malware apps with over 8 million installs was discovered on Google Play, targeting…
Russian law enforcement has arrested and indicted notorious ransomware affiliate Mikhail Pavlovich Matveev (also known as Wazawaka, Uhodiransomwar, m1x, and…
Free unofficial security patches have been released through the 0patch platform to address a zero-day vulnerability introduced over two years…
Qualified applicants must be able to test ransomware encryption and find bugs that might enable defenders to jailbreak the malware.
Hackers have used new GodLoader malware exploiting the capabilities of the widely used Godot game engine to evade detection and…
The first UEFI bootkit specifically targeting Linux systems has been discovered, marking a shift in stealthy and hard-to-remove bootkit threats…
A stealthy JavaScript injection attack steals data from the checkout page of sites, either by creating a fake credit card…
Over the past year, "Matrix" has used publicly available malware tools and exploit scripts to target weakly secured IoT devices…
Two men have been arrested for allegedly stealing data from and extorting dozens of companies that used the cloud data…