Banshee, a stealer that emerged in mid-2024 to target macOS users, has received an alarming update. The developers behind Banshee have “stolen” Apple’s XProtect encryption, giving the malware increased stealth and attack rate...
A battle to dominate the world of crypto wallet drainers has been unfolding on the dark web. Throughout 2024, a handful of cyber criminal gangs that offer crypto drainers and phishing-as-a-service have proliferated....
The Realst Mac-targeting infostealer is back. This time, the Rust-written crypto-data stealer has been deployed in what looks like a laser-focused spear phishing campaign in which a threat actor is going after Web3...
A new threat targeting game developers and the gaming community is once again leveraging GitHub to infect devices. This new threat, capable of breaching Windows, Mac, and Linux, gains access through malicious downloads...
Amidst its ongoing invasion of Ukraine, Russia continues to flex its digital and military muscles to gain leverage in potential negotiations. In this threat landscape, new malware attacks by a Russia-linked threat group...
A threat actor is using X (formerly Twitter) to distribute links to a fake AI video generator website that hosts malware. The malware in this campaign are infostealers, and they can breach Windows...
A new attack that carries all the trademarks of a wider, evolving crypto-targeting North Korean campaign has been recently uncovered. SentinelOne, the first to report this new threat, said they have “high confidence”...
LightSpy, a piece of spyware malware that gained its reputation in 2020 for breaking into iPhones, is back. Researchers who have been following the C2 servers of LightSpy’s alleged developers have found that...
BitDefender has uncovered a threat group using malvertising to distribute an information stealer known as SYS01. This development follows a trend that is becoming more popular every day among cybercriminals. BitDefender uncovers a new...
The Microsoft Threat Intelligence team discovered a vulnerability and exploitation in macOS, Safari, and Apple’s TCC framework. While Apple has already patched the vulnerability, understanding how the exploitation works is useful for users...