More

    Exploits

    Fake Ukrainian Police Emails Spread New CountLoader Malware Loader

    New research from cybersecurity firm Silent Push reveals that Russian ransomware gangs are using a new type of malicious program, dubbed CountLoader. This isn’t...

    MalTerminal: New GPT-4-Powered Malware That Writes Its Own Ransomware

    A groundbreaking discovery in cybersecurity research has revealed the emergence of ‘MalTerminal’, potentially the earliest known example of Large Language Model (LLM)-enabled malware that leverages...

    North Korean Hackers Target Crypto Sector With BeaverTail Attack

    North Korean hackers use fake crypto job offers to spread BeaverTail malware, stealing login data and crypto wallets from unsuspecting users. 

    SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 63

    Pierluigi Paganini September 21, 2025 Malware Newsletter SmokeLoader Rises From the Ashes  Hive0154, aka Mustang Panda, drops updated Toneshell backdoor and novel SnakeDisk USB worm Popular Tinycolor...

    DPRK Hackers Use ClickFix to Deliver BeaverTail Malware in Crypto Job Scams

    Threat actors with ties to the Democratic People's Republic of Korea (aka DPRK or North Korea) have been observed leveraging ClickFix-style lures to deliver...

    SpamGPT unleashes a professional-grade spam empire with AI features that lower cybercrime barriers for phishing and ransomware attacks

    (Image credit: Shutterstock) SpamGPT turns phishing into an automated process with minimal expertise Attackers can rotate multiple SMTP servers to dodge email throttling Real-time inbox monitoring enables...

    Malware Analysis Market Segmentation Analysis by Application, Type, and Key Players-Symantec Corporation, McAfee LLC, Cisco Systems Inc., Palo Alto Networks Inc., Fortinet Inc.

    09-20-2025 08:41 PM CET | Advertising, Media Consulting, Marketing Research New Jersey, US State: "The global Malware Analysis market in the Information Technology and Telecom...

    HybridPetya Ransomware Exploits CVE-2024-7344 to Bypass UEFI Secure Boot

    In the ever-evolving world of cybersecurity threats, a new ransomware variant known as HybridPetya has emerged as a sophisticated menace, capable of bypassing one...

    CISA Links Chinese Malware to Ivanti Zero-Day Exploits and Supply-Chain Risks

    In a move underscoring the escalating sophistication of cyber threats, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has dissected malware samples linked to...

    Latest articles