The cybersecurity landscape is ever-evolving, and the latest addition to the arsenal of Russian …
malware loader
-
-
Cybersecurity in Retail Industry
Phishing Campaign Uses UpCrypter in Fake Voicemail Emails to Deliver RAT Payloads
by Lila Hernandez 2 minutes readIn the ever-evolving landscape of cybersecurity threats, a recent phishing campaign has caught the …
-
AI in CybersecurityEmail SecurityMalware Protection
Hackers Using New QuirkyLoader Malware to Spread Agent Tesla, AsyncRAT and Snake Keylogger
by Samantha Rowland 2 minutes readIn a recent development that has put cybersecurity experts on high alert, a new …
-
AI in CybersecurityHealthcare IT SecurityMalware Protection
CastleLoader Malware Infects 469 Devices Using Fake GitHub Repos and ClickFix Phishing
by Nia Walkerby Nia Walker 2 minutes readIn the ever-evolving landscape of cybersecurity threats, a new player has emerged, causing significant …
-
AI in CybersecurityHealthcare IT Security
Hackers Leverage Microsoft Teams to Spread Matanbuchus 3.0 Malware to Targeted Firms
by Nia Walkerby Nia Walker 2 minutes readIn the ever-evolving landscape of cybersecurity threats, a recent development has caught the attention …
-
AI in CybersecurityMalware ProtectionSmall and Medium-sized Businesses (SMBs)
SEO Poisoning Campaign Targets 8,500+ SMB Users with Malware Disguised as AI Tools
by Lila Hernandez 2 minutes readIn the ever-evolving landscape of cybersecurity threats, a recent SEO poisoning campaign has surfaced, …
-
Cybersecurity in Retail Industry
MintsLoader Drops GhostWeaver via Phishing, ClickFix — Uses DGA, TLS for Stealth Attacks
by Priya Kapoorby Priya Kapoor 2 minutes readIn the ever-evolving landscape of cybersecurity threats, a recent development has sparked concerns among …
-
AI in CybersecurityInformation Technology
MintsLoader Drops GhostWeaver via Phishing, ClickFix — Uses DGA, TLS for Stealth Attacks
by David Chenby David Chen 2 minutes readIn the ever-evolving landscape of cybersecurity threats, a recent development has caught the attention …
-
3D printing technologyAI in Cybersecurity
New Malware Loaders Use Call Stack Spoofing, GitHub C2, and .NET Reactor for Stealth
by Samantha Rowland 2 minutes readIn the ever-evolving landscape of cybersecurity threats, the discovery of a revamped malware loader …
-
AI in CybersecurityMalware Protection
CoffeeLoader Uses GPU-Based Armoury Packer to Evade EDR and Antivirus Detection
by Lila Hernandez 2 minutes readIn the ever-evolving landscape of cybersecurity threats, a new malicious software has emerged, causing …