Windows users will need to be a bit more cautious, as researchers at security firm Securonix have uncovered a new ClickFix malware campaign, dubbed PHALT#BLYX, targeting Microsoft’s operating system.
A new multi-stage malware campaign targeting hospitality organizations during the peak holiday season has been observed, using social engineering techniques such as fake CAPTCHA prompts and simulated ...
Browser extensions promise convenience. Many offer simple tools like new tab pages, translators or video helpers. Researchers, however, uncovered a long-running malware operation that abused that ...
Cybersecurity researchers have disclosed details of a new Python-based information stealer called VVS Stealer (also styled as VVS $tealer) that's capable of ...
Security firm Koi has been busy lately. Its researchers have not only uncovered a sprawling spyware campaign, but they're also keeping tabs on the ever-evolving malware dubbed GlassWorm. In its latest ...
Cybercriminals have always chased whatever people trust the most. First, it was email. Then search results. Now it's AI chat answers. Researchers are warning about a new campaign where fake AI ...
Flu is surging across the U.S., sending thousands more people to the hospital and hitting young children especially hard, as doctors warn the season still has a long way to go. Flu activity is at ...
A Lithuanian national has been arrested for his alleged involvement in infecting 2.8 million systems with clipboard-stealing malware disguised as the KMSAuto tool for illegally activating Windows and ...
Just weeks after the devastating “Second Coming” campaign crippled thousands of development environments, the threat actor behind the Shai-Hulud worm has returned. Security researchers at Aikido have ...
Webroot - known for cloud-based, real-time malware detection that completes scans at high speed without slowing down device performance. The platform incorporates behavioral monitoring and cloud ...
A new Android banking trojan called Sturnus is shaping up to be one of the most capable threats we have seen in a while. It is still in early development, but it already behaves like a fully mature ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results