More

    Exploits

    ModStealer Virus platform-agnostic Invisible Crypto Wallet Thief

     The malware, the ModStealer, silently attacks crypto wallets of Windows, Mac, and Linux by bypassing antivirus protection using fake job advertisements. ModStealer is a typical...

    New Malvertising Campaign Leverages GitHub Repository to Deliver Malware

    A sophisticated malvertising campaign has emerged, exploiting GitHub repositories through dangling commits to distribute malware via fake GitHub Desktop clients. This novel attack vector...

    HybridPetya ransomware dodges UEFI Secure Boot

    A new ransomware strain dubbed HybridPetya was able to exploit a patched vulnerability to bypass Unified Extensible Firmware Interface (UEFI) Secure Boot on unrevoked...

    VoidProxy phishing-as-a-service operation steals Microsoft, Google login credentials

    Service can get around cloud single-sign-on providers, warns Okta. 

    Philippine military company spied upon with new China-linked malware

    Incident responders discovered a novel malware framework while investigating an attack on a Philippine military company attributed to a government-backed hacking group from...

    New HybridPetya ransomware can bypass UEFI Secure Boot

    A recently discovered ransomware strain called HybridPetya can bypass the UEFI Secure Boot feature to install a malicious application on the EFI System Partition. HybridPetya appears...

    ModStealer Malware Targets Crypto Wallets: A Growing Threat Across Platforms

    A new malware strain named ModStealer has emerged, posing a significant threat to cryptocurrency users. 

    SEO Poisoning Attack Hits Windows Users With Hiddengh0st and Winos Malware

    New SEO poisoning campaign exposed! FortiGuard Labs reveals how attackers trick users with fake websites to deliver Hiddengh0st and Winos malware. A new cyberattack campaign...

    Beware! New Android malware steals your money then installs ransomware

    News Experts are warning of a new type of Android malware that combines two different types of attacks into one. Image: Marcos__Silva/Shutterstock.com This article originally appeared on...

    Latest articles