Several ransomware groups have been spotted using a packer-as-a-service (PaaS) platform named Shanya to assist in EDR ...
Hackers are exploiting a new, undocumented vulnerability in the implementation of the cryptographic algorithm present in ...
The malware downloaded by Mark Koh was able to steal wallet credentials without his browser wallets being open.
A RunDLL error occurs when a DLL file that is needed to start with a program, run at startup, or set up as a scheduled task fails to start. Windows tries to load this ...
Huntress reports active attacks abusing Gladinet’s fixed cryptographic keys to forge tickets and gain remote code execution ...
ESET researchers discovered a China-aligned APT group, LongNosedGoblin, which uses Group Policy to deploy cyberespionage ...
A new, modular infostealer called SantaStealer, advertised on Telegram with a basic tier priced at $175 per month, promises ...
Sophos reports STAC6565 targeting nearly 40 victims, with 80% of attacks hitting Canadian firms and involving QWCrypt ransomware.
According to Koh, the scam began on December 5. He encountered an opportunity on Telegram to beta test a new online game titled "MetaToy." ...
Palo Alto Networks reports Hamas‑linked cyber group deploying new tools and infrastructure as it targets regional governments ...
Mobile phone distributor Nokia filed a patent for a “device, method and computer program” which could encrypt digital assets.
Security researchers have uncovered critical infrastructure details tied to the ransomware operation LockBit 5.0, exposing a publicly accessible server and domain used by the gang. The server, ...