News

The Matanbuchus malware loader has been seen being distributed through social engineering over Microsoft Teams calls ...
The use of GitHub gave the malware-as-a-service (MaaS) a reliable and easy-to-use platform that’s greenlit in many enterprise ...
Hiding ransomware inside a CPU was strange but now, attackers are going even deeper and broader across networks. In a recent ...
Malicious GitHub repositories used by threat actors to host Amadey payloads and steal data, impacting targeted entities.
Researchers have known for almost a decade that threat actors sometimes use DNS records to host malicious PowerShell scripts.
PowerShell is the primary command line shell for Windows, designed to address the limitations of the Command Prompt that has been around since the days of MS-DOS. PowerShell 2.0 w ...
The new ransomware group, tracked as Water Pombero, is targeting healthcare, tech, and event services in Asia, Europe, and ...
Newly published research shows that the domain name system—a fundamental part of the web—can be exploited to hide malicious ...
By using scripting tools, threat actors query the DNS records and reconstruct the malware without triggering the usual ...
Neptune RAT, according to Gen Digital, shares striking overlaps with another remote access trojan referred to as XWorm, suggesting that the first iteration of the malware is a derivative of the latter ...
Cybersecurity firm ReversingLabs uncovered two lines of malicious code in an update forETHCode, an open source suite of tools ...
In 2025, picking the best programming language for automation can mean fewer headaches and faster results. This post walks through how to weigh speed, tool support, and ease of use. We look at Python, ...