Discover the types of malware in 2025, from backdoors to ransomware, and learn which families hackers use most in real-world attacks.
A new phishing and malware distribution toolkit called MatrixPDF allows attackers to convert ordinary PDF files into ...
For the last few years, Mac users are facing a wave of fake apps on Microsoft-owned GitHub that disguise themselves as popular software, only to trick victims into handing over their passwords.
GUI design can be a tedious job, requiring the use of specialist design tools and finding a suitable library that fits your ...
Dustin Kirkland of Chainguard explains how verified, hardened components and AI-powered automation can prevent malware ...
ZachXBT documents North Korean IT workers infiltrating crypto companies in over 25 instances for hacks and extortion schemes.
ESET researchers reveal how malware operators collaborate with covert North Korean IT workers, posing a threat to both headhunters and job seekers.
New DDoS botnet ShadowV2 targets misconfigured Docker containers and offers a service model where customers launch their own attack.
The campaign detailed in the report, dubbed “ShadowV2,” is a Python-based command-and-control framework hosted on GitHub ...
In essence, MalTerminal is a malware generator. When adversaries bring it up, it asks if they want to create a ransomware ...
Binance founder CZ Zhao issued urgent warnings about North Korean hackers infiltrating crypto companies through fake job ...
ClickFix typically asks the victim to perform a fake CAPTCHA test. FileFix tricks the user into copying and pasting a command into a file upload window or File Explorer, which after victims press ...