Threat actors have launched a new malware campaign that uses an MitM attack to infect unsuspecting users with the Plead backdoor.
An advanced persistent threat (APT) group known as ScarCruft is now using malware to steal information off of Bluetooth devices.
Security researchers discovered that a new DLL CryptoMix ransomware variant is reportedly using Windows Remote Desktop Services (RDS) to install itself on unsuspecting users' machines.
Fighting fileless malware attacks will take some serious effort and careful coordination among a variety of tools and techniques.
More than 100 unique exploits of a WinRAR bug have been identified since security researchers discovered a 19-year-old vulnerability in the file compression system.
Security researchers discovered several Microsoft Windows EXE files using malicious payloads to infect macOS users with infostealers and adware.
In 2017 and 2018, threat actors used a toolkit called KoffeyMaker in multiple black box ATM attacks targeting Eastern European financial institutions.
Researchers observed threat actors impersonating the Brazilian postal service in a malware campaign that combines legitimate Windows files such as WMI and CertUtil to steal banking data.
A new attack campaign is using Rich Text Format (RTF) files to distribute the Agent Tesla Trojan along with other malware.
Researchers reported that the Octopus malware is using a Windows Trojan to target political entities based in Central Asia.