News
IntroductionZscaler ThreatLabz researchers recently uncovered AI-themed websites designed to spread malware. The threat actors behind these attacks are exploiting the popularity of AI tools like ...
A deceptive fake error attack vector, ClickFix, surged by over 500%, becoming the second most common attack method after ...
The H1 2025 issue of the ESET Threat Report reviews the key trends and developments that shaped the threat landscape from ...
Use of the ClickFix attack vector has shot up by 517% since the second half of 2024, making it the second most abused attack vector behind phishing. The attack uses a fake reCAPTCHA to trick users ...
Lumu, the cybersecurity company pioneering Continuous Compromise Assessment, today issued the 2025 Compromise Report ...
A new cybersecurity campaign has exposed 67 trojanized GitHub repositories, targeting gamers and developers with malicious ...
The additional payloads downloaded by the backdoor include info-stealers and remote access trojans such as Lumma Stealer, AsyncRAT, and Remcos, all featuring extensive data theft capabilities ...
Dozens of people have been arrested, and thousands of IP addresses seized, in an Interpol-led international law enforcement operation aimed at disrupting a network of infostealers and other malware.
U.S. sanctions Russian BPH provider Aeza Group for hosting ransomware attacks, dark web drugs, and cybercrime.
The report revealed that ClickFix is also being used to deploy Lumma Stealer and “SectopRAT," a .NET-based RAT. “Attackers leveraged ClickFix and a malvertising campaign using fake Google ads to ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results