Content Paint

malware

"Absurd" 12-step malware dropper spotted in malicious npm packages

Supply chain attack effort used steganography, a "dizzying wall of Unicode characters" and more.

Authorities claim to have broken key links in the ‘ransomware kill chain’…for now at least

Cybercrim whack-a-mole as Operation Endgame continues

A rat pokes its head through a cardboard box. the SpyNote malware is described as an AndroidOS RAT

China nexus group suspected as the attackers behind attacks

CISA uncovers more Ivanti ICS  targeting malware…dub it RESURGE

It’s the end of March 2025...of course CISOs still need to worry about Ivanti Connect Secure flaws.

A malicious file pop up on a Windows laptop. ClearFake uses fake pop ups to prompt users to run infected code

Threat is "widespread and affects many users worldwide."

new macOS malware XCSSET

Fresh persistence and obfuscation techniques seen in dangerous XCSSET family

From Microsoft Graph API to Tor, new malware gets creative with C2

"By relying on Tor hidden services, the compromised system creates a persistent circuit to the Tor network"

Malware is increasingly going after browser-stored credentials, password managers

Malware now performs an average of 14 malicious actions.

PlugX: The FBI is your new antivirus

French law enforcement and FBI lead mass-deletion of persistent malware attributed to Chinese APT. Some 20 other countries may have quietly done the same...

Search the site

Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Great! You've successfully signed up.
Great! You've successfully signed up.
Welcome back! You've successfully signed in.
Success! You now have access to additional content.