Malware

InvisibleFerret Malware Attacking Windows Users Through Fake Job Interview Tactics

Over the past months, the North Korean APT Lazarus has been employing a sophisticated and coordinated approach, targeting the technology,…

13 hours ago

Botnet Exploits 13,000 MikroTik Devices By Abusing Misconfigured DNS Records

Cybersecurity experts at Infoblox Threat Intel have uncovered a sophisticated botnet leveraging misconfigured DNS records to bypass email protection systems…

6 days ago

Rootkit Malware Exploiting 0-Day Vulnerabilities to Control Linux Systems Remotely

Fortinet researchers uncovered an advanced rootkit malware exploiting multiple zero-day vulnerabilities in enterprise appliances by executing a shell script (Install.sh).…

1 week ago

100 Million macOS Users At Risk – New Banshee Malware Attacks Bypassing Apple’s XProtect

Researchers analyzed new versions of the Banshee macOS Stealer sample that initially evaded detection by most antivirus engines, as analysis…

1 week ago

Weaponized LDAP PoC Exploit Installing Information-Stealing Malware

Security researchers are tricked into downloading and executing information-stealing malware by a fake proof-of-concept (PoC) exploit for CVE-2024-49113, dubbed LDAPNightmare.…

2 weeks ago

5 Benefits Of A Malware Sandbox For Business Security

Imagine an employee receiving an email that looks completely legitimate, maybe it’s a fake invoice or a shipping update. They…

2 weeks ago

New NonEuclid RAT Bypassing Antivirus And Encrypts Critical Files

The NonEuclid Remote Access Trojan (RAT), a highly sophisticated malware, has been detected, allowing unauthorized remote access via advanced evasion…

2 weeks ago

Hackers Weaponize Pentesting Tools With Malicious npm, PyPI, & Ruby Packages

Threat actors leverage Out-of-Band Application Security Testing (OAST) techniques in the npm, PyPI, and RubyGems ecosystems to carry out multi-stage…

2 weeks ago

New FireScam Android Malware Abusing Firebase Services To Evade Detection

FireScam, an information stealer malware with spyware capabilities, is being disseminated as a fake "Telegram Premium" application. The malware spreads…

2 weeks ago

Malicious npm Packages Attacking Developers To Steal Sensitive Data Including Private Keys

A malicious npm campaign that poses as the Hardhat plugins and the Nomic Foundation is observed to target Ethereum developers…

3 weeks ago