In recent years, the use of malware embedded in Adobe Acrobat PDF plugins has become an increasingly sophisticated threat to cybersecurity. As PDFs are a widely used format for document sharing, they ...
A newly discovered FileFix social engineering attack impersonates Meta account suspension warnings to trick users into unknowingly installing the StealC infostealer malware. FileFix is a new variant ...
Threat actors are now abusing DNS queries as part of ClickFix social engineering attacks to deliver malware, making this the first known use of DNS as a channel in these campaigns.
Darktrace researchers say hackers used AI and LLMs to create malware to exploit the React2Shell vulnerability to mine ...
Our guide explains all you need to know about identity theft, including what it is, how to prevent it, and what to do if ...
A new malware campaign is turning WhatsApp Web into a weapon. Security researchers say a banking Trojan linked to Astaroth is now spreading automatically through chat messages, making the attack ...
TikTok has become one of the most powerful engines for viral trends, and attackers are quietly riding that wave to slip malware onto phones and laptops. Instead of relying on clumsy spam emails, they ...
On a cold winter night in 2016, Ukrainians experienced the first-ever known blackout caused by malicious code (malware) designed to autonomously attack the power grid. One-fifth of Kyiv’s citizens ...
The landscape of malware analysis has significantly evolved, driven by the increasing sophistication of cyber threats and the advanced techniques being developed to combat them. Malware attacks on US ...
Back in February 2025, several media outlets warned of a new threat targeting users of Google’s Gmail email service. Attackers used AI technology to perfect phishing emails and make them look more ...
Attackers are increasingly using AI to generate adaptable malware that can evade traditional defenses, making familiar security playbooks less reliable by the day.
The arrival of generative AI software like ChatGPT prompted immediate speculation that hackers would use those programs to create and fine-tune malware attacks. Products like ChatGPT and Gemini might ...