- Android trojans use TensorFlow AI to mimic human ad clicks for fraud · Fake apps on GetApps and other platforms spread malware with hidden browsers · At …
- Using new tactics, the scammers swoop in, register the expired domain, trigger a password reset on the Snap Store account, and gain control of a …
- A multi-stage Windows malware campaign uses business lures and cloud abuse to disable Defender before deploying ransomware.
- Web skimming is a technique where criminals secretly add malicious code to checkout pages so they can steal payment details as shoppers type them in.
- The attack leveraged a malicious driver called POORTRY as part of a known technique referred to as bring your own vulnerable driver (BYOVD) to disarm …
- The malware's activity is limited to encryption and system modification related to extortion; removal of the ransomware prevents further encryption …
- KnowBe4 warns of a Skeleton Key campaign in which attackers abuse RMM tools such as GoTo and LogMeIn for backdoor access.
- Public container registries (Docker Hub, ECR Public) are silent risk multipliers in 2026 — crypto mining, malware, typo-squatting in images.
- A team of researchers has revived Linux page cache attacks, demonstrating that they are not as impractical as previously believed.
- The vulnerability affected RealHomes CRM versions 1.0.0 and earlier and allowed any logged-in user with Subscriber-level access or higher to upload …
- SMBs are attractive targets for ransomware attacks because they often lack security staff and tools, and operate within limited cybersecurity budgets.
- Anubis ransomware is a Ransomware-as-a-Service (RaaS) group that challenges one of the core assumptions of modern ransomware response…
- Key Findings: Check Point Research (CPR) is tracking a phishing campaign linked to a North Korea–aligned threat actor known as KONNI. This activity …
- The credential harvesting stage sees the attackers sending phishing emails disguised as legitimate Greenvelope invitations in an attempt to trick …
- A recent investigation by The Hacker News details a malware campaign that uses LinkedIn direct messages to distribute a remote access trojan (RAT) …
- Scroll to continue reading. Now, the cybersecurity company says it has observed a new wave of malicious SSO logins on FortiGate appliances …
- A solo developer utilizing AI agents and advanced methodology created VoidLink, a highly sophisticated Linux malware framework.
- This year, the landscape of cybersecurity will never be the same. Experts gave us their prediction, from data surges to AI malware.
- Check Point Research says the Linux malware framework was authored largely through AI-driven processes, lowering the barrier to producing complex …
- Suspected Nation-State Threat Actor Uses New Airstalk Malware in a Supply Chain Attack .NET · CL-STA-1009 · Malicious PowerShell scripts · Read now …