Gh0st RAT spreads through Dragon Breath and large-scale impersonation campaigns using multi-stage loaders and evasive NSIS installers targeting Chines ...
Maverick malware spreads via WhatsApp Web, targeting Brazilian banks through PowerShell and browser hijacking.
Cryptopolitan on MSN
Maverick malware takes over WhatsApp Web
Cybersecurity firms CyberProof, Trend Micro, Sophos, and Kaspersky believe Maverick attacks WhatsApp web users by combining ...
11don MSNOpinion
Gootloader malware back for the attack, serves up ransomware
Gootloader JavaScript malware, commonly used to deliver ransomware, is back in action after a period of reduced activity.
In the new campaign, Gootloader was most likely leveraged by a group known as Storm-0494, as well as its downstream operator, ...
North Korean state-sponsored threat actors, part of the infamous Lazarus Group, have been seen hosting malware and other ...
Rhysida operates as a ransomware-as-a-service (RaaS) model, with core developers providing malware tools and infrastructure to affiliates, who carry out attacks and take a share of the ransom profits.
Record operating cash flow (before working capital adjustments) for the three months ended September 30, 2025, of $101.8 ...
In fact, the Rhysida group is a famous ransomware operator. It works on a RaaS principle - developing and maintaining the ...
Russia's nation-state hacking groups have returned to pummeling Ukrainian targets with destructive, wiper malware, including ...
Hackers revive GootLoader with a clever font deception that hides malware in plain sight. Learn how this new visual trick ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results