Several ransomware groups have been spotted using a packer-as-a-service (PaaS) platform named Shanya to assist in EDR ...
Hackers are exploiting a new, undocumented vulnerability in the implementation of the cryptographic algorithm present in ...
TikTok users say they’re exposing hidden text in Epstein documents via redaction flaws—but experts warn viral claims may ...
The malware downloaded by Mark Koh was able to steal wallet credentials without his browser wallets being open.
A RunDLL error occurs when a DLL file that is needed to start with a program, run at startup, or set up as a scheduled task fails to start. Windows tries to load this ...
Huntress reports active attacks abusing Gladinet’s fixed cryptographic keys to forge tickets and gain remote code execution ...
ESET researchers discovered a China-aligned APT group, LongNosedGoblin, which uses Group Policy to deploy cyberespionage ...
ESET researchers offer a deep dive analysis of the CVE 2025 50165 vulnerability and provide their method to reproduce the crash using a simple 12-bit or 16-bit JPG image, and an examination of the ...
A new, modular infostealer called SantaStealer, advertised on Telegram with a basic tier priced at $175 per month, promises ...
According to Koh, the scam began on December 5. He encountered an opportunity on Telegram to beta test a new online game titled "MetaToy." ...
Kaspersky has uncovered a new malware that hides within fake game mods and cheats to steal crypto wallet data and sensitive ...
Palo Alto Networks reports Hamas‑linked cyber group deploying new tools and infrastructure as it targets regional governments ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results