More

    Exploits

    Malware Complexity Surges 127% in Six Months: OPSWAT Report Reveals Legacy Systems Miss 1 in 14 Threats

    OPSWAT, a leading provider of critical infrastructure protection, recently released its first-ever Threat Landscape Report at Black Hat USA, revealing key insights from over...

    AI is transforming cyberattacks as ransomware becomes smarter and organizations scramble to protect sensitive data from evolving threats

    (Image credit: Shutterstock/supimol kumying) 80% of ransomware attacks are now powered by artificial intelligence tools AI enables malware creation, phishing campaigns, and deepfake-driven social engineering attacks LLMs...

    ChillyHell modular macOS malware OKed by Apple in 2021

    ChillyHell, a modular macOS backdoor believed to be long dormant, has likely been infecting computers for years while flying under the radar, according to...

    Chinese APT Hits Philippine Military Firm with New EggStreme Fileless Malware

    Bitdefender uncovers EggStreme, a fileless malware by a China-based APT targeting the Philippine military and APAC organisations. Cybersecurity researchers at Bitdefender have identified a new...

    CyberVolk Ransomware Attacking Windows System in Critical Infrastructure and Scientific Institutions

    CyberVolk ransomware targets gov and critical infrastructure in Japan, France, and the UK, demanding $20K Bitcoin via Telegram. 

    New Fileless Malware Attack Uses AsyncRAT for Credential Theft

    LevelBlue Labs has published new research on a recent attack that used a fileless loader to deliver AsyncRAT, a well-known Remote Access Trojan used...

    Crypto malware scare

    ⚡ Crypto malware scare: In the biggest supply chain hack in history, hackers hijacked 18 huge npm packages (chalk, debug and others), slipping in...

    Misconfigured Docker APIs targeted by novel malware

    Hackread reports that threat actors have exploited unsecured Docker APIs to facilitate the distribution of new malware that prevents external API access while deploying...

    New GONEPOSTAL Malware Hijacking Outlook to Enable Command and Control Communication

    GONEPOSTAL malware hijacks Outlook via phishing, using COM APIs to send encrypted C2 emails and evade traditional defenses. 

    Latest articles