GootLoader malware is abusing malformed ZIP archives that bypass common tools like WinRAR & deliver JavaScript payloads via ...
Cybercriminals use ErrTraffic tool to automate malware distribution through fake browser error messages, with attacks ...
CERT-UA reports PLUGGYAPE malware attacks targeting Ukrainian defense forces via Signal and WhatsApp, using phishing links ...
A ransomware operation known as DeadLock has been observed abusing Polygon blockchain smart contracts to manage and rotate ...
A new ClickFix social engineering campaign is targeting the hospitality sector in Europe, using fake Windows Blue Screen of ...
Cybersecurity researchers are becoming interested in a newly discovered ransomware strain called DeadLock that abuses Polygon smart contracts to silently service its infrastructure and bypass ...
Unlike traditional shell replacements like Cairo Shell or Open-Shell that are built with native Windows APIs and compiled C++ ...
The DeadLock ransomware group, a newly emerged digital extortion group, is using blockchain smart contracts to store proxy ...
The pre-positioning approach of Littleton and Volt Typhoon is indicative of Beijing’s emerging interest in waging war against entire systems, attacking the connective tissue that allows an adversary ...
Group-IB researchers said the most unusual aspect of DeadLock lies in its use of Polygon smart contracts to manage ...
A vulnerability in SmarterTools’ SmarterMail platform could lead to remote code execution on vulnerable mail servers.