Home Search
malware - search results
If you're not happy with the results, please do another search
New XorDDoS Malware Allows Attackers to Create Sophisticated DDoS Bot Network
A significant evolution in distributed denial-of-service (DDoS) malware has been detected, with the latest version of XorDDoS continuing to spread globally between November 2023...
Hackers Weaponize MMC Script to Deploy MysterySnail RAT Malware
A sophisticated cyberespionage campaign leveraging malicious Microsoft Management Console (MMC) scripts to deploy the stealthy MysterySnail remote access trojan (RAT).
First identified in 2021 during...
Agent Tesla Malware Employs Multi-Stage Attacks Using PowerShell Scripts
Security researchers have identified a sophisticated malware campaign utilizing Agent Tesla variants delivered through elaborate multi-stage attack sequences.
The malware operation, discovered in mid-April 2025,...
Researchers Uncovered Gamaredon’s PteroLNK VBScript Malware Infrastructure & TTP’s
A sophisticated malware campaign attributed to the Russia-linked Gamaredon threat group has been actively targeting Ukrainian entities since late 2024, according to new research...
Mustang Panda Employs Using Weaponized RAR Archives to Install New ToneShell Malware
Security researchers have uncovered new malicious activities attributed to Mustang Panda, a China-sponsored espionage group known for targeting government entities, military organizations, and non-governmental...
Beware of Online PDF Converters That Tricks Users to Install Password Stealing Malware
Cybercriminals have launched a sophisticated malware campaign leveraging fake PDF-to-DOCX converter websites that mimic the popular legitimate service PDFCandy.
The malicious websites, including domains such...
3 Malware Tactics Used To Evade Detection By Corporate Security: See Examples
Some threats don’t kick down the door; they slip in, stay quiet, and wait.
These days, attackers are playing the long game, using evasion techniques...
Chinese Hackers Using New BRICKSTORM Malware to Attack Windows & Linux Machines
Cybersecurity experts have uncovered a sophisticated backdoor malware called BRICKSTORM being deployed by Chinese state-aligned hackers against European industries of strategic importance.
The malware, linked...
Hackers Abuse Node.js to Deliver Malware – Microsoft Warns
Attackers are increasingly exploiting Node.js, a widely trusted, open-source JavaScript runtime, to deliver sophisticated malware, steal sensitive data, and compromise entire systems.
Recent campaigns observed since late...
How and Why Threat Hunting Teams Investigate Linux Malware Attacks
Linux cyber threats are less widespread than Windows ones yet it can make them even more dangerous. Underestimated and under-anticipated, they stab endpoints and...