Malware

Game Mods Conceal Infostealer Malware A Threat to Corporate IT Systems
Cybersecurity
Game Mods Conceal Infostealer Malware: A Threat to Corporate IT Systems
Seemingly innocuous game modifications can carry infostealer malware that quietly compromises identities and systems. An example is how Roblox mods could escalate PC infections into ...
Emerging Threats Cloudflare WAF Bypass and Snap Store Malware
Cybersecurity
Emerging Threats: Cloudflare WAF Bypass and Snap Store Malware
Recent developments in cybersecurity reveal a Cloudflare WAF bypass, Cannonical's Snap Store malware, and the termination of Curl's bug bounty program. Explore how these issues ...
GootLoader Employs Malformed ZIP Files to Evade Detection
Malware
GootLoader Employs Malformed ZIP Files to Evade Detection
Cybersecurity analysts have discovered that GootLoader is using malformed ZIP archives in a bid to circumvent detection. By concatenating 500 to 1,000 archives, it employs ...
Malware Campaign Exploits DLL Side-Loading in c-ares Library
Application Security
Malware Campaign Exploits DLL Side-Loading in c-ares Library
Security experts uncovered a malware scheme bypassing security via DLL side-loading in c-ares library. Attackers leverage a malicious libcares-2.dll to deploy trojans.
PLUGGYAPE Malware Targets Ukraine's Defense Amid Rising Cyber Threats
Cybersecurity
PLUGGYAPE Malware Targets Ukraine’s Defense Amid Rising Cyber Threats
CERT-UA reported recent cyberattacks targeting Ukraine's defense using PLUGGYAPE malware. Security experts associate these assaults with medium confidence to the Russian-affiliated Void Blizzard group.
WebRAT Malware Utilizing GitHub for Malicious Distribution
Cybersecurity
WebRAT Malware Utilizing GitHub for Malicious Distribution
WebRAT malware spreads through GitHub, claiming to offer proof-of-concept exploits for recent vulnerabilities, revealing challenging implications for cybersecurity experts.
RomCom Malware Exploits SocGholish to Deliver Mythic Agent
Cybersecurity
RomCom Malware Exploits SocGholish to Deliver Mythic Agent
A U.S. civil engineering firm's security was compromised by RomCom malware in September 2025. Researchers at Arctic Wolf Labs discovered the attack's intricacies, including the ...
EVALUSION Threat Cluster Uses Fake ClickFix Tools to Push Dual Malware Payloads
Cybersecurity
EVALUSION Threat Cluster Uses Fake ClickFix Tools to Push Dual Malware Payloads
A malware campaign tied to the EVALUSION threat cluster is abusing fake ClickFix utilities to deploy Amatera Stealer or NetSupport RAT. The attackers use staged ...
Former Jabber Zeus Developer Extradited to U.S. to Face Cybercrime Charges
Malware
Former Jabber Zeus Developer Extradited to U.S. to Face Cybercrime Charges
Ukrainian national Yuriy “MrICQ” Rybtsov has been extradited to the U.S. for his alleged role in developing the infamous Jabber Zeus banking malware. The decade-old ...
OpenAI Assistants API Abused in New Malware Campaign Leveraging Covert C2 Channel
Application Security
OpenAI Assistants API Abused in New Malware Campaign Leveraging Covert C2 Channel
Microsoft has uncovered a new backdoor malware strain using OpenAI’s Assistants API as a covert command-and-control channel. The discovery marks one of the first cases ...