Since early 2023, Proofpoint has observed an increase in the email distribution of malware associated with suspected Chinese cybercrime activity. This includes the attempted delivery of...
Positive Technologies analyzed attacks on individuals in Middle Eastern countries between 2022 and 2023. Malware was used in 70% of successful attacks. More than half of these...
Following the report on the Operation Triangulation campaign targeting iOS devices, Kaspersky researchers have released a special ‘triangle_check’ utility that automatically searches for malware infection. The tool...
Proofpoint researchers recently identified an increase in threat actor use of OneNote documents to deliver malware via email to unsuspecting end-users in December 2022 and January...
In January 2023 Kaspersky researchers reported on a new domain name system (DNS) changer functionality used in the Roaming Mantis campaign. Now cybercriminals can use compromised...
Netskope has unveiled new research showing that over 400 distinct cloud applications delivered malware in 2022, nearly triple the amount seen in the prior year. Netskope...
Written by Lukas Stefanko, Malware Researcher at ESET These days, the device in your pocket can do far more than call or send text messages. Your...
CrowdStrike Holdings has announced the release of the 2022 CrowdStrike Global Threat Report, which details an 82% increase in ransomware-related data leaks, debuts two new adversaries...
Check Point Research (CPR) has seen a new malware campaign exploiting Microsoft’s digital signature verification to steal sensitive information of victims. Named ZLoader, the malware is...
ESET researchers have discovered a previously unknown malware family that utilizes custom and well-designed modules, targeting operating systems running Linux. Modules used by this malware family,...