More

    Exploits

    Browser extension malware hits millions worldwide

    A long‑running malware campaign secretly exploited trusted browser extensions, putting millions at risk and exposing major flaws in extension marketplace security. Millions of browser users...

    PDFSIDER Malware – Exploitation of DLL Side-Loading for AV and EDR Evasion

    Pierluigi Paganini January 20, 2026 Resecurity has learned about PDFSIDER during an investigation of a network intrusion attempt that was successfully prevented by a...

    ‘CrashFix’ Scam Crashes Browsers, Delivers Malware

    The attack consists of a NexShield malicious browser extension, a social engineering technique to crash the browser, and a Python-based RAT. 

    VoidLink Represents the Future of AI-Developed Malware: Check Point

    Check Point researchers uncovered an advanced malware they say was largely created by one individual using AI, an early example of how the rapidly...

    VoidLink cloud malware shows clear signs of being AI-generated

    The recently discovered cloud-focused VoidLink malware framework is believed to have been developed by a single person with the help of an artificial intelligence...

    Fake Chrome extension ‘breaks’ your computer before it hits you with malware — how to stay safe

    (Image credit: Shutterstock) Share by: Share this article 0 Join the conversation Follow us Add us as a preferred source on Google Newsletter Subscribe to our newsletter You can never be too careful...

    Remember VoidLink, the cloud-targeting Linux malware? An AI agent wrote it

    VoidLink, the newly spotted Linux malware that targets victims' clouds with 37 evil plugins, was generated "almost entirely by artificial intelligence" and likely developed...

    Gootloader Malware Maintains Low Detection Rate While Bypassing Most Security Tools

    Gootloader malware continues to evade detection, bypassing most security tools while maintaining a low detection rate. 

    APT-Grade PDFSider Malware Used by Ransomware Groups

    Providing cyberespionage and remote code execution capabilities, the malware is executed via DLL sideloading. 

    Latest articles