News

Phishing campaign mimics CAPTCHA to deliver hidden malware commands PowerShell command hidden in verification leads to Lumma Stealer attack Educating users on phishing tactics is key to preventing ...
North Korean cyber spies created two businesses in the U.S., in violation of Treasury sanctions, to infect developers working ...
Hackers tried using SourceForge to distribute malware, but thanks to the platform’s swift reaction, a major escalation seems to have been averted. Security researchers Kaspersky said they ...
A new Android malware has been discovered hidden inside trojanized versions of the Alpine Quest mapping app, which is ...
The distribution is handled by someone else, and when (or if) the malware gets noticed and flagged, the malware developer can just move on to the next service and start again. [TestFlight] is ...
Unlike hijacking, which alters resolution paths, cache poisoning exploits weaknesses in the DNS resolution process itself, enabling large-scale phishing, credential theft and malware distribution.
DomainTools shared its findings on Coquettte’s activity in a report published on April 3, 2025. The cybercriminal’s ventures include malware distribution, as well as the sale of guides for ...
A recent investigation has uncovered that the North Korean state-sponsored hacking group known as Lazarus has registered ...
Popular platforms like Telegram, Steam, and Facebook are increasingly misused for phishing, malware distribution, and identity impersonation. The report notes a dramatic rise in tech support and ...