Threat actors are still abusing Visual Studio Code extensions as an entry point, with the latest fake Prettier incident showing a multi-stage path from marketplace install to credential theft and full ...
The known RAT aimed at gamers is now targeting security professionals searching GitHub for PoCs and exploit codes.
PyStoreRAT spreads via fake GitHub tools using small Python or JavaScript loaders to fetch HTA files and install a modular ...
A new malware implant called EtherRAT, deployed in a recent React2Shell attack, runs five separate Linux persistence mechanisms and leverages Ethereum smart contracts for communication with the ...
North Korean group Kimsuky uses QR code phishing sites posing as CJ Logistics to spread DocSwap Android malware with RAT ...
A sharp increase in cyber-attacks involving the Remcos remote access Trojan (RAT) has been identified in Q3 2024. The malware, delivered through phishing emails and malicious attachments, enables ...
Researchers discovered a new type of malware attack that can steal sensitive information from Android devices. 'Pixnapping' can steal display information from apps, pull pixel values, and ...
Blind Eagle launches new multi-stage malware attacks via spear-phishing to compromise systems and deploy memory-resident ...
A stealthy fileless malware attack leveraging PowerShell to deploy Remcos RAT has been observed bypassing traditional antivirus systems by operating entirely in memory, avoiding any obvious traces on ...
A new remote access trojan (RAT) called 'ResolverRAT' is being used against organizations globally, with the malware used in recent attacks targeting the healthcare and pharmaceutical sectors.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results