More

    Exploits

    DeadLock Ransomware Uses Polygon Smart Contracts For Proxy Rotation

    A ransomware operation known as DeadLock has been observed abusing Polygon blockchain smart contracts to manage and rotate proxy server addresses. DeadLock first appeared in...

    Hackers Exploit c-ares DLL Side-Loading to Bypass Security and Deploy Malware

    Security experts have disclosed details of an active malware campaign that's exploiting a DLL side-loading vulnerability in a legitimate binary associated with the open-source...

    ‘Imagination the limit’: DeadLock ransomware gang using smart contracts to hide their work

    Researchers at Group-IB say the DeadLock ransomware operation is using blockchain-based anti-detection methods to evade defenders' attempts to analyze their tradecraft. First spotted in July...

    Experts warn this new Chinese Linux malware could be preparing something seriously worrying

    (Image credit: Shutterstock) Share by: Share this article 0 Join the conversation Follow us Add us as a preferred source on Google Check Point Research discovers an advanced Linux malware framework...

    CrazyHunter Ransomware Escalates With Advanced Intrusion Tactics

    New research from Trellix detailed that CrazyHunter ransomware has emerged as a serious and escalating threat, underscoring the growing sophistication of modern cybercriminal operations....

    New Linux malware framework targets cloud and containers

    Researchers have uncovered a previously unknown Linux framework that can infect systems. It uses an extensive modular design with unusually advanced attack capabilities. Check Point...

    New Linux malware detected: admins “may never realize their infrastructure has been quietly taken over”

    Highly sophisticated and customizable Linux malware, VoidLink, has been discovered targeting cloud infrastructure. 

    Linux Systems Face a New Predator: Inside VoidLink’s Sophisticated Attack Arsenal

    Security researchers discovered VoidLink, sophisticated Linux malware framework with 30+ modules designed for stealthy, long-term access to cloud environments. 

    Stealthy CastleLoader Malware Targets U.S. Government Entities

    Stealthy CastleLoader malware is targeting U.S. government entities, raising concerns over advanced cyber espionage activity. 

    Latest articles