malware

94 Articles
A new automated removal tool can stop most remote-controlled malware
Tech

A new automated removal tool can stop most remote-controlled malware

formal model instantiated from the Youku sample. Credit: Hitchhiking Vaccine: Enhancing Botnet Remediation With Remote Code Deployment Reuse. Cyberattacks can snare workflows, put...

Lotus Panda hits unnamed government with bespoke hacking tools and malware
Tech

Lotus Panda hits unnamed government with bespoke hacking tools and malware

The group struck government, air control, and telco firms in Southeast Asia Victims were not named Lotus Panda used never-before-seen infostealers and loaders...

Criminals are impersonating a popular online PDF converter service to trick users into downloading malware
Tech

Criminals are impersonating a popular online PDF converter service to trick users into downloading malware

Fake PDF converters are tricking users with cloned sites and fake CAPTCHAs PowerShell command installs malware that steals browser and crypto wallet data...

Russian bulletproof hosting system targeted by hackers to spread malware
Tech

Russian bulletproof hosting system targeted by hackers to spread malware

Trustwave finds multiple malware C2 servers hosted on Proton66 Ransomware is hosted there, too Some phishing pages targeting Android users originated from Proton66...

IPVanish’s malware protection confirmed among the best on the market
Tech

IPVanish’s malware protection confirmed among the best on the market

IPVanish’s malware and tracker blocking technology has been confirmed as one of the best on the market VIPRE Advanced Security received the highest...

Sophisticated new ResolverRAT malware targeting healthcare and pharmaceutical sectors
Tech

Sophisticated new ResolverRAT malware targeting healthcare and pharmaceutical sectors

Security researchers spot a new trojan called ResolverRAT It comes with advanced obfuscation and persistence mechanisms It targets healthcare and pharma organizations around...

“Slopsquatting” attacks are using AI-hallucinated names resembling popular libraries to spread malware
Tech

“Slopsquatting” attacks are using AI-hallucinated names resembling popular libraries to spread malware

GenAI can hallucinate open source package names, experts warn It doesn’t always hallucinate a different name Cybercriminals can use the names to register...

Russian hackers hit military mission in Ukraine with info-stealing malware on external drives
Tech

Russian hackers hit military mission in Ukraine with info-stealing malware on external drives

Symantec says it found GammaSteel on devices belonging to a military operation in Ukraine GammaSteel is an infostealer built by Russian cyber-outfit Gamaredon...

ESET security scanner vulnerability used to deploy TCESB malware
Tech

ESET security scanner vulnerability used to deploy TCESB malware

Kaspersky observed a threat actor called ToddyCat abusing a bug in ESET’s cybersecurity solution The group used a now-patched flaw to deploy a...