News

Researchers have known for almost a decade that threat actors sometimes use DNS records to host malicious PowerShell scripts.
A novel malware family named LameHug is using a large language model (LLM) to generate commands to be executed on compromised ...
A stealthy malware campaign is hijacking computers to secretly mine Monero (XMR), blending cryptojacking and ransomware ...
The use of GitHub gave the malware-as-a-service (MaaS) a reliable and easy-to-use platform that’s greenlit in many enterprise ...
The Matanbuchus malware loader has been seen being distributed through social engineering over Microsoft Teams calls ...
Newly published research shows that the domain name system—a fundamental part of the web—can be exploited to hide malicious ...
Hiding ransomware inside a CPU was strange but now, attackers are going even deeper and broader across networks. In a recent ...
If you’ve ever stumbled upon the mysterious file named $rw8t1ct.exe on your computer, you’re probably wondering, “What is ...
Even at the free tier, Hide.me's automated connection is some of the best we’ve seen. Users can set rules when connected to Wi-Fi whether it’s secured or unsecured, and Ethernet, including automatic ...