This appears to be the first UEFI bootkit that goes beyond Windows and targets Linux machines, according to ESET security ...
Tech expert Kurt “CyberGuy" Knutsson says North Korean hackers hide malware in macOS apps, bypassing Mac security checks.
Malware hidden inside a fake NFT game ignores two-factor authentication and gains access to a victim's Google account via a ...
While GhostSpider took all the limelight, Salt Typhoon was also spotted using other, never-seen-before variants, including a ...
An old Avast Anti-Rootkit driver is being abused to deliver Windows malware, according to a report from cybersecurity firm ...
The Chinese state-sponsored hacking group Salt Typhoon has been observed utilizing a new "GhostSpider" backdoor in attacks ...
APT-K-47, aka Mysterious Elephant, exploits Hajj themes and Asyncshell malware in Pakistan-targeted cyberattacks.
Some third-party software companies behave like true malware sellers, packing their products with really questionable ...
New Glove Stealer information-stealing malware can bypass Google Chrome's Application-Bound (App-Bound) encryption to steal ...
New stealthy malware loader BabbleLoader evades antivirus and sandboxes, delivering WhiteSnake and Meduza stealers globally.
Zscaler’s latest report finds 54.5% of IoT attacks target manufacturing, with the industry suffering more than three times the weekly attacks of other sectors ...
A hacking group that is believed to be Chinese state-sponsored has compromised two websites with ties to the Tibetan ...