More

    Exploits

    Ethereum smart contracts hijacked: Hackers use ETH to hide malware — is blockchain’s security at risk?

    Ethereum, the world’s second-largest cryptocurrency, is facing a stealthy and sophisticated threat. Hackers are now embedding malware instructions directly intoEthereum smart contracts, exploiting ETH’s...

    New Malware Uses Windows Character Map for Cryptomining

    Darktrace reports new malware hijacking Windows Character Map for cryptomining, exposing risks of hidden attacks in everyday software processes. Cybersecurity artificial intelligence firm, Darktrace, has...

    Give your PC a fresh start: New free tools to boost your PC’s speed, security, and peace of mind

    If you ever have the feeling your computer is dragging its feet, or shows odd behavior, you’re not alone. In some cases, the culprit...

    Malwarebytes Launches New Features to Improve Windows Device Performance and Security including Firewall Function

    Easy-to-use tools help users fix computer issues, improve device speed and strengthen protection and privacy, at no additional cost SANTA CLARA, Calif., Sept. 4, 2025...

    This Android Malware Is Spreading Through Facebook Ads

    Did you know you can customize Google to filter out garbage? Take these steps for better search results, including adding Lifehacker as a preferred...

    Hackers Exploit Ethereum to Inject Malware in Popular Coding Libraries

    Hackers are exploiting Ethereum smart contracts to inject malware into popular NPM coding libraries, using packages to run malicious commands. 

    New ‘NotDoor’ Malware Targets Outlook Users for Data Theft and System Compromise

    Russian state-sponsored hackers have developed a sophisticated new backdoor malware called “NotDoor” that specifically targets Microsoft Outlook users, enabling attackers to steal sensitive data...

    XWorm Malware Adopts New Infection Chain to Bypass Security Detection

    Cybersecurity researchers have identified a sophisticated evolution in XWorm malware operations, with the backdoor campaign implementing advanced tactics to evade detection systems. The Trellix Advanced...

    New Dire Wolf Ransomware Attack Windows Systems, Deletes Event Logs and Backup-Related Data

    Dire Wolf ransomware hits 16 global firms with double extortion, advanced encryption, and anti-recovery tactics since May 2025. 

    Latest articles