A security researcher discovered a vulnerability in Windows theme files in the previous year, which allowed malicious actors to steal…
The ongoing Meta malvertising campaign, active for over a month, employs an evolving strategy to distribute the SYS01 InfoStealer through…
The researchers have observed consistent efforts by Russia, Iran, and China to exert foreign influence on democratic processes in the…
Researchers discovered a Russian-linked threat actor, UNC5812, utilizing a Telegram persona named "Civil Defense. " This persona has been distributing…
In July 2024, the ransomware group Embargo targeted US companies using the malicious loader MDeployer and EDR killer MS4Killer. MDeployer…
Singapore’s government has instructed internet service providers to block access to websites deemed “inauthentic,” which are believed to be part…
The attackers use a multi-stage attack, starting with a malicious LNK file disguised as a healthcare-related document. This file, likely…
The LightSpy threat actor exploited publicly available vulnerabilities and jailbreak kits to compromise iOS devices. The malware's core binaries were…
WrnRAT is a new malware attack that cybercriminals have deployed by using popular gambling games like Badugi, Go-Stop, and Hold'em…
The researcher discovered a vulnerability in the Windows Update process that allowed them to downgrade critical system components, including DLLs,…