GitVenom Malware Campaign Targets Crypto Users via GitHub
The GitVenom malware campaign uses hundreds of compromised GitHub repositories to distribute info-stealers, RATs, and clipboard hijackers, stealing cryptocurrency and
The GitVenom malware campaign uses hundreds of compromised GitHub repositories to distribute info-stealers, RATs, and clipboard hijackers, stealing cryptocurrency and
A new, highly evasive Auto-Color Linux backdoor targets North American and Asian governments and universities. The malware uses custom encryption
New MacOS malware, FrigidStealer, uses web injection attacks by cybercriminal groups TA2726 and TA2727, distributing malware based on browser
FinalDraft malware uses Outlook email drafts for covert command-and-control communication, enabling data exfiltration, process injection, and lateral movement with minimal
Cybercriminals are exploiting Microsoft Teams for ransomware attacks, using spam emails, Teams messages, and calls to infiltrate companies, steal data,
A new Mirai botnet is using zero-day exploits to target industrial routers and smart home devices, launching high-intensity DDoS attacks.
PLAYFULGHOST malware uses phishing, SEO poisoning, and trojanized VPN apps to steal data, highlighting the need for robust cybersecurity practices.
The Bitter cyberespionage group is targeting Turkish defense organizations with the new MiyaRAT malware, a sophisticated RAT with enhanced encryption
The FBI warns of widespread HiatusRAT malware attacks targeting vulnerable web cameras and DVRs, primarily Chinese-branded devices, exploiting known vulnerabilities
Iranian-linked hackers are using the newly discovered IOCONTROL malware to target critical infrastructure in Israel and the US, compromising IoT
Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.