A sophisticated ClickFix campaign is targeting entities in the hospitality sector to infect them with the DCRat remote access ...
Threat actors are using the social engineering technique to deploy the DCRat remote access Trojan against targets in the hospitality sector.
Researchers at Zscaler ThreatLabz have found three malicious Bitcoin npm packages that are meant to implant malware named ...
The Windows Blue Screen (or Black Screen) of Death is typically a sign that some unrecoverable error or conflict has occurred. Now, cybercriminals are using the dreaded BSOD as a way to trick people ...
Transparent Tribe (APT36) is linked to new cyber-espionage attacks using malicious LNK files, adaptive RATs, and long-term ...
A newly discovered FileFix social engineering attack impersonates Meta account suspension warnings to trick users into unknowingly installing the StealC infostealer malware. FileFix is a new variant ...
In November 2024, Microsoft Incident Response researchers uncovered a remote access Trojan (RAT) called StilachiRAT. This discovery highlights the evolving nature of cyber threats, with the malware ...
A stealthy fileless malware attack leveraging PowerShell to deploy Remcos RAT has been observed bypassing traditional antivirus systems by operating entirely in memory, avoiding any obvious traces on ...
A new remote access trojan (RAT) called 'ResolverRAT' is being used against organizations globally, with the malware used in recent attacks targeting the healthcare and pharmaceutical sectors.
An operation targeting inexperienced, novice threat actors gained access to its targets through backdoored GitHub repositories. The attacks were recently discovered after a customer reached out to ...
Threat actors continue to probe Visual Studio Code's extension ecosystem, and a late November incident shows how quickly a trusted developer tool can be turned into a supply chain beachhead. In a ...
Distributed via phishing emails, the DLL side-loaded malware’s payload is executed only in memory and uses sophisticated detection evasion and anti-analysis techniques. Security researchers have ...