Signed malware backed by a stolen EV certificate deployed legitimate RMM tools to gain persistent access inside enterprise ...
TrustConnect is back, this time used to deploy legitimate but weaponized RMM solutions.
A tampered copy of FileZilla quietly contacts attacker-controlled servers using encrypted DNS traffic that can slip past ...
Security researchers demonstrated that any browser extension can secretly install malware by modifying downloaded files ...
Crims hope for payday from malicious payloads rather than stealing access tokens Microsoft has warned organizations about ...
OAuth redirection is being repurposed as a phishing delivery path. Trusted authentication flows are weaponized to move users ...
North Korean hackers are deploying newly uncovered tools to move data between internet-connected and air-gapped systems, spread via removable drives, and conduct covert surveillance.
Four rogue NuGet packages and one npm package stole ASP.NET Identity data, deployed C2 backdoors, and reached over 50,000 ...
Is that CAPTCHA you just encountered real? Find out how fake CAPTCHAs are installing hidden malware and how to stay safe.
New malware spreads via fake GitHub downloads, stealing browser passwords, crypto wallets, Discord tokens, and credit card ...
Cofense Intelligence exposes how threat actors abuse Windows File Explorer and WebDAV servers to bypass browser security and ...
Microsoft's Defender Security Research Team has identified a series of phishing campaigns in which an unknown attacker used digitally signed malware masked as common workplace applications to deploy ...