-
Fake CAPTCHA attacks are now a key entry point for a new wave of LummaStealer infections, with CastleLoader loaders turning simple web clicks into full system compromise. Less than a year after a major law-enforcement takedown, the infostealer’s operat…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Security researchers are tracking Socelars, an information-stealing Trojan aimed at Windows users that focuses on quietly harvesting browser-based access rather than damaging files. The malware is designed to collect authenticated session data and othe…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
VoidLink represents a concerning evolution in malware development: a sophisticated Linux command-and-control framework that shows clear signs of being built with AI assistance. This Linux malware operates as a modular implant designed for long-term acc…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
GuLoader, also known as CloudEye, is a sophisticated malware downloader that has been active since late 2019. Its primary function is to download and install secondary malware, such as Remote Access Trojans (RATs) and information stealers, onto comprom…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Hackers are using Signal QR codes and fake support scams to spy on military and political leaders, German security agencies warn.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
The North Korean-backed advanced persistent threat (APT) group known as ScarCruft has significantly evolved its attack techniques. In a departure from their established methods, the group is now using a sophisticated OLE-based dropper to distribute its…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Cisco Talos uncovers DKnife, a China-nexus framework targeting routers and edge devices. Learn how seven stealthy implants hijack data and deliver malware via AitM attacks.
·
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
APT activity across APAC is rising rapidly as geopolitical tensions continue to grow, and defenders are seeing more advanced tradecraft aimed at long-term access. Taiwan stood out as the most targeted environment, with 173 tracked attacks far higher th…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
The nightmare scenario for any modern business is simple but devastating: scammers clone your website, steal your domain identity, and rob your customers. By the time the complaints roll in, the money is gone, and your reputation is left in tatters. Th…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Cybersecurity firm eSentire’s TRU break down the Russian Prometei botnet attack on a UK firm, detailing its TOR usage, password theft and decoy tactics.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶


