More

    Exploits

    MacSync macOS Malware Distributed via Signed Swift Application

    A recent MacSync Stealer version no longer requires users to directly interact with the terminal for execution. 

    MacSync Stealer variant bypasses Apple malware protections

    We’ve recently seen how ChatGPT was used to trick Mac users into installing MacStealer, and now a different tactic has been found to persuade...

    New Wonderland Android Malware with Bidirectional SMS-Stealing Capabilities Stealing OTPs

    Wonderland Android malware targets Central Asia, using fake apps to steal SMS and OTPs through multi-stage infections. 

    Ukrainian Nefilim Ransomware Affiliate Pleads Guilty in US

    Artem Stryzhak pleaded guilty to conspiracy to commit computer fraud after he was extradited earlier this year. 

    Massive Android botnet Kimwolf infects millions, strikes with DDoS

    Pierluigi Paganini December 21, 2025 Kimwolf is a newly discovered Android botnet linked to the Aisuru botnet that has infected over 1.8 million devices...

    Swarm-Based Machine Learning Method Developed for Detecting IoT Malware

    Researchers have introduced a novel method for detecting malware in Internet of Things (IoT) devices, utilizing machine learning models within a swarm-based architecture. The...

    Swarm AI for IoT Malware Detection Advancements

    In a bold step toward securing the Internet of Things (IoT), a team of researchers has proposed a revolutionary approach to malware detection, one...

    Malware from Roblox Targets Crypto Wallets

    Cybersecurity firm Kaspersky has discovered a new type of infostealer malware called Stealka, which is being distributed through unofficial and pirated game mods, including...

    CISA Releases New Indicators of Compromise Tied to BRICKSTORM Malware

    CISA along with NSA, has released updated indicators of compromise (IOCs) and detection signatures for BRICKSTORM malware. 

    Latest articles