Malware

LLM-enabled MalTerminal Malware Leverages GPT-4 to Generate Ransomware Code

Cybersecurity researchers have identified what is believed to be the earliest known instance of malware that leverages a Large Language…

24 hours ago

How Fileless Malware Differs From Traditional Malware Attacks

The cybersecurity landscape has witnessed a dramatic evolution in attack methodologies, with fileless malware emerging as one of the most…

1 week ago

First-Ever Malicious MCP Server Found in the Wild Steals Emails via AI Agents

The first-ever malicious Model-Context-Prompt (MCP) server discovered in the wild, a trojanized npm package named postmark-mcp that has been secretly…

2 weeks ago

Hackers Bypassing Windows Mark of the Web Files Using LNK Stomping Attack

A sophisticated attack technique called LNK Stomping has emerged as a critical threat to Windows security, exploiting a fundamental flaw…

3 weeks ago

New Clickfix Attack Promises “Free WiFi” But Delivers Powershell-Based Malware

The Cybersecuritynews researcher team uncovered a sophisticated social engineering campaign that is exploiting the public's need for free internet access,…

4 weeks ago

New Malware Using Azure Functions For Hosting Command And Control Infrastructure

A new, sophisticated malware campaign has been uncovered that leverages Microsoft's Azure Functions for its command-and-control (C2) infrastructure, a novel…

4 weeks ago

How SOCs Triage Incidents in Seconds with Threat Intelligence

When every minute counts, it’s important to have access to fresh threat intelligence at the tip of your finger. That’s…

2 months ago

ERMAC v3.0 Banking Malware Source Code Exposed via Weak Password ‘changemeplease’

Researchers at Hunt.io have made a significant discovery in the cybersecurity field by obtaining and analyzing the complete source code…

2 months ago

New Undectable Plague Malware Attacking Linux Servers to Gain Persistent SSH Access

A sophisticated Linux backdoor dubbed Plague has emerged as an unprecedented threat to enterprise security, evading detection across all major…

2 months ago

New DCHSpy Android Malware Steals WhatsApp Data, Call Logs, Record Audio and Take Photos

A sophisticated new variant of DCHSpy Android surveillanceware, deployed by the Iranian cyber espionage group MuddyWater just one week after…

3 months ago