"Living Off the Land" attacks use built-in tools and processes instead of traditional malware.
North Korean hackers are deploying newly uncovered tools to move data between internet-connected and air-gapped systems, spread via removable drives, and conduct covert surveillance.
ESET researchers document how the Sednit APT group has reemerged with a modern toolkit centered on two paired implants – BeardShell and Covenant.
China-linked CL-STA-1087 targets Southeast Asian militaries since 2020 using AppleChris and MemFun for espionage and credential theft.
The Russian state-sponsored APT28 threat group is using a custom variant of the open-source Covenant post-exploitation ...
Unwitting victims are now being tricked into installing malware via Windows Terminal, but some experts say this is old news.
Those aren't toys. Malware used in a sophisticated spear-phishing and infostealing campaign by Russian bad actors includes a component dubbed BlackSanta that can shut down antivirus and EDR ...
Crooks tweak familiar copy-paste ruse so that victims run malicious commands themselves A new twist on the long-running ...
Malicious Chrome extensions tied to ownership transfers push malware and steal data, exposing thousands to credential theft and system compromise.
State-backed cyber threat actors from non-combatant states are taking advantage of the Israeli-US war on Iran to fulfil their own goals, according to Proofpoint analysts.
Hackers are abusing Windows Terminal in a new ClickFix attack that installs Lumma Stealer and steals browser passwords while ...
A threat campaign against human resource (HR) departments has recently been launched. What seems like a decent resume ...