A new malware-as-a-service (MaaS) information stealer named SantaStealer is being advertised on Telegram and hacker forums as ...
The malware downloaded by Mark Koh was able to steal wallet credentials without his browser wallets being open.
HP’s latest threat report reveals rising use of sophisticated social engineering, SVG-based attacks, fake software updates, and AI-enhanced malware as cybercriminals escalate tactics to evade ...
Researchers report phishing emails in Russia using ISO attachments to deploy Phantom Stealer against finance and related ...
Know how cybercriminals use LLMs to target crypto users. Learn about AI-generated phishing, fake smart contracts, and how to ...
Bad actors have always sought the path of least resistance. In the world of SaaS, that path often leads directly to stolen identities. Passwords, API keys, OAuth tokens and multi-factor authentication ...
The end of support for Windows 10 means it's now a prime target for malware. But that doesn't mean you have to upgrade to ...
A fake torrent for Leonardo DiCaprio's 'One Battle After Another' hides malicious PowerShell malware loaders inside subtitle ...
North Korean hackers are using ‘fake Zoom’ call tactics to lure victims to install malware, exfiltrating crypto assets from ...
A new campaign involving 19 malicious Visual Studio Code extensions used a legitimate npm package to embed malware in ...
A further investigation from Huntress showed similarly poisoned results via both ChatGPT and Grok using more general ...
Research by HP’s Wolf Security has uncovered the sophisticated tools now being utilised by hackers I think it is fair to say ...