
GootLoader Employs Malformed ZIP Files to Evade Detection
Cybersecurity analysts have discovered that GootLoader is using malformed ZIP archives in a bid to circumvent detection. By concatenating 500

Cybersecurity analysts have discovered that GootLoader is using malformed ZIP archives in a bid to circumvent detection. By concatenating 500

Security experts uncovered a malware scheme bypassing security via DLL side-loading in c-ares library. Attackers leverage a malicious libcares-2.dll to

CERT-UA reported recent cyberattacks targeting Ukraine’s defense using PLUGGYAPE malware. Security experts associate these assaults with medium confidence to the

WebRAT malware spreads through GitHub, claiming to offer proof-of-concept exploits for recent vulnerabilities, revealing challenging implications for cybersecurity experts.

A U.S. civil engineering firm’s security was compromised by RomCom malware in September 2025. Researchers at Arctic Wolf Labs discovered

A malware campaign tied to the EVALUSION threat cluster is abusing fake ClickFix utilities to deploy Amatera Stealer or NetSupport

Ukrainian national Yuriy “MrICQ” Rybtsov has been extradited to the U.S. for his alleged role in developing the infamous Jabber

Microsoft has uncovered a new backdoor malware strain using OpenAI’s Assistants API as a covert command-and-control channel. The discovery marks

China-linked APT group Bronze Butler exploited a zero-day flaw in Motex Lanscope Endpoint Manager to deploy an upgraded Gokcpdoor malware

Over 760 malicious Android apps are exploiting NFC tap-to-pay features to steal payment credentials in real time. The surge in
Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.