Protect your users and your business from Advanced Persistent Threat (APT) attacks by spotting these red flags and taking action before the hackers do. The...
Telegram has patched a zero-day flaw in its Android application that allows attackers to hide malicious payloads in video files. Learn more about the flaw and...
New versions of the Medusa malware have emerged targeting Android devices across the US, the U.K., Canada, France, Italy, Spain, and Turkey. Find out details...
Polyfill.io, a domain used by more than 110,000 websites to deliver javascript code, has been used for a supply chain attack, potentially leading to data theft...
Trend Micro discovered that the Noodle RAT backdoor has been misidentified as Gh0st RAT and Rekoobe since 2018. It has been used for cyberespionage and...
Gain valuable insights into the cyber threats Russian companies are facing from the HellHounds group, which is using the Decoy Dog malware. Take immediate...
Threat actors are using fraudulent antivirus websites to spread infostealer malware to Android and Windows devices. Learn more about the threat and how to...
Security researchers have discovered a new cybercrime campaign exploiting platforms such as FileZilla and GitHub to spread malware. Learn more about the...
Grandoreiro, a banking trojan, has targeted financial institutions worldwide since March 2024. Learn more about the threat and its potential effects on...
A cybersecurity report disclosed information-stealing campaigns against macOS users. Learn more about the implications of the attacks and the strategies used...
The botnet focuses on stealing cloud credentials to deliver malicious payloads. The post U.S. Federal Agencies Send Out Warnings About Androxgh0st Malware...