A critical Zoom vulnerability put Windows users at risk of data theft and system compromise. Zoom has patched the flaw. Users ...
Transparent Tribe (APT36) is linked to new cyber-espionage attacks using malicious LNK files, adaptive RATs, and long-term ...
Russia-aligned UAC-0184 abuses Viber messages to deliver Hijack Loader and Remcos RAT in espionage attacks on Ukrainian ...
The WebRAT malware is now being distributed through GitHub repositories that claim to host proof-of-concept exploits for ...
Multiple ransomware gangs are using a packer-as-a-service platform named Shanya to help them deploy payloads that disable endpoint detection and response solutions on victim systems. Packer services ...
ESET researchers offer a deep dive analysis of the CVE 2025 50165 vulnerability and provide their method to reproduce the crash using a simple 12-bit or 16-bit JPG image, and an examination of the ...
The known RAT aimed at gamers is now targeting security professionals searching GitHub for PoCs and exploit codes.
Cybersecurity researchers Kaspersky said they found 15 malicious repositories hosted on GitHub. These repositories, ...
Troubleshooting a Windows PC can oftentimes be quite a bore—and depending on your specific issue, it can either be pretty ...
The malware downloaded by Mark Koh was able to steal wallet credentials without his browser wallets being open.
To the surprise of almost nobody, the unprecedented build-out of datacenters and the equipping of them with servers for ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results