The report from Group-IB concerns the discovery of RustyAttr, a brand new piece of macOS malware built using the Tauri ...
Researchers discover Glove Stealer, a new infostealer It can bypass Google's cookie encryption mechanism, introduced last ...
Android users take notice. The new and improved "FakeCall" malware convincingly hijacks bank phone calls and redirects them ...
A hacking group that is believed to be Chinese state-sponsored has compromised two websites with ties to the Tibetan ...
The report suggests that the malware is hiding within various gaming-related applications, such as speed boosters and ...
Think "Stranger Things" on Netflix. The malware we’re talking about here is just like that. It’s called FakeCalls, and every ...
A new malicious package called 'SteelFox' mines for cryptocurrency and steals credit card data by using the "bring your own ...
The Glove Stealer malware leverages a recently disclosed App-Bound encryption bypass method in attacks against browsers.
The AI-based features are rolling out to Pixel 6 or newer first but will soon be expanded to other Android devices, Google ...
A malware botnet is exploiting a zero-day vulnerability in end-of-life GeoVision devices to compromise and recruit them for likely DDoS or cryptomining attacks.
To detect, observe, and analyze different types of malicious TTPs in a safe environment, we can use ANY.RUN's Interactive ...
The attackers are using Google's Flutter platform to make malicious crypto apps that can ultimately grant remote access to a ...