Signed malware backed by a stolen EV certificate deployed legitimate RMM tools to gain persistent access inside enterprise ...
TrustConnect is back, this time used to deploy legitimate but weaponized RMM solutions.
A tampered copy of FileZilla quietly contacts attacker-controlled servers using encrypted DNS traffic that can slip past ...
Crims hope for payday from malicious payloads rather than stealing access tokens Microsoft has warned organizations about ...
Latest cybersecurity threats, malware campaigns, research findings, and key security developments from this week’s ThreatsDay ...
OAuth redirection is being repurposed as a phishing delivery path. Trusted authentication flows are weaponized to move users ...
Cofense Intelligence exposes how threat actors abuse Windows File Explorer and WebDAV servers to bypass browser security and ...
A phishing campaign is using a fake Google Account security page to deliver a web-based app capable of stealing one-time ...
Microsoft's Defender Security Research Team has identified a series of phishing campaigns in which an unknown attacker used digitally signed malware masked as common workplace applications to deploy ...
Security researchers demonstrated that any browser extension can secretly install malware by modifying downloaded files without requiring additional permissions or triggering warnings.
New malware spreads via fake GitHub downloads, stealing browser passwords, crypto wallets, Discord tokens, and credit card ...
Millions installed 'productivity' Chrome extensions that became malware after acquisition. Here's how browser extensions became enterprise security's weakest link.