More

    Exploits

    Experts say malware protection is worth the cost after statewide cyberattack

    LAS VEGAS (KTNV) — Sunday’s statewide cyberattack has left many Nevadans wondering how to keep their personal information safe from hackers. While malware protection...

    Npm Package Hijacked to Steal Data and Crypto via AI-Powered Malware

    A threat actor released malicious updates on the npm package repository for components of a tool popular among developers intending to steal cryptocurrencies and...

    VirusTotal Launches Endpoint That Explains Code Functionality for Malware Analysts

    Virustotal today unveiled a powerful addition to its Code Insight suite: a dedicated API endpoint that accepts code snippets—either disassembled or decompiled—and returns succinct...

    Sweden scrambles after ransomware attack puts sensitive worker data at risk

    Municipal government organisations across Sweden have found themselves impacted after a ransomware attack at a third-party software service supplier. Software firm Miljödata, which provides a...

    New framework aims to outsmart malware evasion tricks

    Attackers have learned how to trick machine learning malware detectors with small but clever code changes, and researchers say they may finally have an...

    Sophisticated “Gayfemboy” Malware Is Attacking Multiple Industries Around the Globe

    Witthaya Prasongsin All products are independently selected by our editors. If you buy something, we may earn an affiliate commission. You’ve heard of “be gay, do...

    Malware devs abuse Anthropic’s Claude AI to build ransomware

    Anthropic's Claude Code large language model has been abused by threat actors who used it in data extortion campaigns and to develop ransomware packages. The...

    Hackers Abuse Microsoft Teams to Gain Remote Access With PowerShell-based Malware

    Cybercriminals are increasingly weaponizing Microsoft Teams, exploiting the platform's trusted role in corporate communications to deploy malware and seize control of victim systems. 

    Latest articles