GootLoader malware is abusing malformed ZIP archives that bypass common tools like WinRAR & deliver JavaScript payloads via ...
As attackers hide longer and deeper, behavior-first detection becomes the only reliable way to expose them.
Cybercriminals use ErrTraffic tool to automate malware distribution through fake browser error messages, with attacks achieving 60% conversion rates.
CERT-UA reports PLUGGYAPE malware attacks targeting Ukrainian defense forces via Signal and WhatsApp, using phishing links ...
A ransomware operation known as DeadLock has been observed abusing Polygon blockchain smart contracts to manage and rotate ...
Cybersecurity researchers are becoming interested in a newly discovered ransomware strain called DeadLock that abuses Polygon smart contracts to silently service its infrastructure and bypass ...
The DeadLock ransomware group, a newly emerged digital extortion group, is using blockchain smart contracts to store proxy ...
The pre-positioning approach of Littleton and Volt Typhoon is indicative of Beijing’s emerging interest in waging war against entire systems, attacking the connective tissue that allows an adversary ...
Group-IB researchers said the most unusual aspect of DeadLock lies in its use of Polygon smart contracts to manage ...
A vulnerability in SmarterTools’ SmarterMail platform could lead to remote code execution on vulnerable mail servers.
DeadLock ransomware relies on Polygon smart contracts to spin proxy servers to produce a nearly unshuttable infrastructure.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results