Google Calendar, Docs hit by info-stealing malware - here's how to safeguard your devicesMalware is targeting Google Calendars, Docs, and Slides through phishing schemes.Users are advised to be cautious with unsolicited invites and links.
The new ransomware groups worrying security researchers in 2025The ransomware ecosystem is increasingly fragmented with new smaller groups emerging alongside traditional mega-groups.
Why 'malware as a service' is becoming a serious problemMalware as a service model is now a dominant mode of cybercrime, facilitating a substantial increase in detected threats.Phishing remains the primary method for initial access in growing malware campaigns.The surge in malware attacks is propelled by a flood of duplicated malware rather than a rise in new threats.
Trojanized Game Installers Deploy Cryptocurrency Miner in Large-Scale StaryDobry AttackCybercriminals are exploiting popular games to distribute cryptocurrency miners through trojanized installers.The StaryDobry campaign specifically targets users interested in gaming, showcasing a sophisticated attack chain.
Chinese Hackers Exploit MAVInject.exe to Evade Detection in Targeted Cyber AttacksMustang Panda uses Microsoft Application Virtualization Injector to evade ESET antivirus detection, highlighting evolving cyber attack techniques.
Google Calendar Malware Is on the Rise. Here's How To Stay SafeGoogle Calendar is a target for scam attacks that deceive users into revealing personal information.
Google Calendar, Docs hit by info-stealing malware - here's how to safeguard your devicesMalware is targeting Google Calendars, Docs, and Slides through phishing schemes.Users are advised to be cautious with unsolicited invites and links.
The new ransomware groups worrying security researchers in 2025The ransomware ecosystem is increasingly fragmented with new smaller groups emerging alongside traditional mega-groups.
Why 'malware as a service' is becoming a serious problemMalware as a service model is now a dominant mode of cybercrime, facilitating a substantial increase in detected threats.Phishing remains the primary method for initial access in growing malware campaigns.The surge in malware attacks is propelled by a flood of duplicated malware rather than a rise in new threats.
Trojanized Game Installers Deploy Cryptocurrency Miner in Large-Scale StaryDobry AttackCybercriminals are exploiting popular games to distribute cryptocurrency miners through trojanized installers.The StaryDobry campaign specifically targets users interested in gaming, showcasing a sophisticated attack chain.
Chinese Hackers Exploit MAVInject.exe to Evade Detection in Targeted Cyber AttacksMustang Panda uses Microsoft Application Virtualization Injector to evade ESET antivirus detection, highlighting evolving cyber attack techniques.
Google Calendar Malware Is on the Rise. Here's How To Stay SafeGoogle Calendar is a target for scam attacks that deceive users into revealing personal information.
$10 Infostealers Are Breaching Critical US Security: Military and Even the FBI HitCybercrime poses a significant threat to secure organizations, largely due to human error and the low cost of accessing stolen data.
Crazy Evil Gang Targets Crypto with StealC, AMOS, and Angel Drainer MalwareCrazy Evil is a cybercrime gang exploiting social media scams to steal digital assets and install malware.
$10 Infostealers Are Breaching Critical US Security: Military and Even the FBI HitCybercrime poses a significant threat to secure organizations, largely due to human error and the low cost of accessing stolen data.
Crazy Evil Gang Targets Crypto with StealC, AMOS, and Angel Drainer MalwareCrazy Evil is a cybercrime gang exploiting social media scams to steal digital assets and install malware.
The TechBeat: Cybercrooks Are Using Fake Job Listings to Steal Crypto (2/18/2025) | HackerNoonA campaign is tricking blockchain developers to install malware via fake job interviews, endangering MetaMask users.
Data-stealing Mac malware XCSSET returns with fresh tricksA new variant of XCSSET malware is targeting Mac users, particularly Apple developers, with enhanced obfuscation and persistence techniques.
Deepseek-impersonating malware is stealing data, research findsMalicious actors are exploiting the popularity of DeepSeek through information-stealing packages on the Python Package Index.
Apple allowed screenshot-reading malware onto App StoreKaspersky has identified an iOS app that contains spyware designed to steal cryptocurrency by targeting wallet recovery phrases.
Apple allowed screenshot-reading malware onto App StoreKaspersky has identified an iOS app that contains spyware designed to steal cryptocurrency by targeting wallet recovery phrases.
Mirai variant Murdoc_Botnet targets cameras and routersA new variant of Mirai, Murdoc_Botnet, specifically targets AVTech cameras and Huawei routers, posing significant security risks to IoT devices.
It's Doom ... running in a PDF fileDoom has been successfully ported to a PDF format, showcasing creativity within programming.The implementation challenges serve both as a demonstration of skill and an exploration of the PDF file format capabilities.