Malware

Hackers Use SVG Files to Deploy PureMiner Malware and Steal Sensitive Information

Cybercriminals exploit malicious SVG files in phishing campaigns targeting Ukrainian organizations, deploying Amatera Stealer and PureMiner malware through sophisticated attack chains. FortiGuard Labs has uncovered...

North Korean IT Operatives Collaborate with Malware Operators to Strike Corporate Organizations

A comprehensive white paper presented at Virus Bulletin 2025 reveals the intricate operations of DeceptiveDevelopment, a North Korea-aligned threat actor that collaborates with fraudulent...

Emerging XCSSET Variant Threatens macOS App Developers

Microsoft Threat Intelligence has identified a sophisticated new variant of the XCSSET malware, which poses significant risks to macOS developers working with Xcode projects....

Threat Actors Exploit Copyright Takedowns to Deliver Malware

A novel email campaign attributed to the Lone None threat actor group is leveraging copyright infringement takedown notices to distribute two families of information...

Hackers Use Silent Malware to Take Over WordPress Admin Accounts

Cybersecurity researchers have uncovered a sophisticated WordPress malware campaign that uses two complementary backdoor files to maintain persistent administrative access to compromised websites. The...

Popular

Subscribe

spot_imgspot_img