A drive-by download attack is a type of cyber threat where malicious software is downloaded and installed on a user’s device without their knowledge or consent simply by visiting a compromised or ...
Everyday Mac users are now a common target for hackers and one of the key ways they attempt to infiltrate the systems is ...
Wordfence published an advisory on the WordPress Malcure Malware Scanner plugin, which was discovered to have a vulnerability rated at a severity level of 8.1. At the time of publishing, there is no ...
A new malware variant dubbed RESURGE has been uncovered by the US Cybersecurity and Infrastructure Security Agency (CISA) and is targeting Ivanti Connect Secure appliances through a critical ...
Discover how crypto malware operates through cryptojacking and ransomware, with real-world examples such as WannaMine and PowerGhost ...
The Chinese-speaking ToddyCat advanced persistent threat (APT) group is targeting a security vulnerability in ESET's antivirus software to silently execute malicious payloads on infected devices.
CISA has published a Malware Analysis Report (MAR) with analysis and associated detection signatures on files related to Microsoft SharePoint vulnerabilities, according to a press release yesterday.
In recent years, the use of malware embedded in Adobe Acrobat PDF plugins has become an increasingly sophisticated threat to cybersecurity. As PDFs are a widely used format for document sharing, they ...
CISA has published a malware analysis report with compromise indicators and Sigma rules for "ToolShell" attacks targeting specific Microsoft SharePoint Server versions.… "Cyber threat actors have ...
Security researchers at Zimperium zLabs, a mobile security software provider, have uncovered a sophisticated evolution of the "GodFather" banking malware, which employs an advanced on-device ...
Camellia Chan is the CEO and Cofounder of Flexxon, a next-generation hardware cybersecurity solutions provider with a global presence. In 2024 alone, fileless malware like HeadCrab doubled its grip on ...
Threat actors continue to exploit ToolShell to gain unauthorized access to on-premises SharePoint servers. On August 6, 2025, the Cybersecurity and Infrastructure Security Agency (CISA) released a ...