DPRK-linked actors use GitHub C2 and LNK phishing in South Korea, enabling persistent PowerShell control and data ...
Hackers gained access to an API for the CPUID project and changed the download links on the official website to serve ...
Threat actors using a previously undocumented phishing-as-a-service (PhaaS) platform called "VENOM" are targeting credentials ...
If you've downloaded CPU-Z or HWMonitor recently, you might want to double check the files you've used, as they could be infected.
The CPU-Z And HWMonitor installers being compromised is notable because a user could do everything correctly and still get pwned.
A researcher released a working ‘BlueHammer’ Windows zero-day exploit that could impact over 1 billion devices, granting ...
The multi-stage campaign targeting South Korea uses weaponized Windows shortcuts and GitHub-based command and control to ...
The financially motivated cybercriminal threat actor Storm-1175 operates high-velocity ransomware campaigns that weaponize ...
We've tested more than 100 anti-malware apps to help you find the best malware protection and removal software for all your ...
With the links giving you a malware-infected file instead ...
Most people who own a computer infected with botnet malware have no idea their machine is compromised. The software is ...