Infostealers are on the rise and are fast becoming one of the most popular types of malware in the cybercriminal´s toolkit for 2023. Infostealers can breach your Mac, iPhone, or iPad without you...
In yet another creative move, cybercriminals have found a way to leverage Google’s free services to target victims. Avanan, a CheckPoint company, has released the findings of a new investigation uncovering how cybercriminals...
DuckTail, a group of cybercriminals from Vietnam, has been targeting TikTok, Facebook, LinkedIn, and Google for years. Now, a new investigation finally reveals how they breach accounts, infect devices, and steal sensitive data. ...
XLoader, a popular information stealer that has been around since 2015 and mostly targets Windows computers, is back. And now, it can breach your Mac. In fact, SentinelOne has reported that the new...
SentinelOne has released a report on a new infostealer targeting Apple’s latest OS release, macOS 14 Sonoma. The malware can not only steal passwords and browser data but can also empty crypto wallets. This...
On July 19, 2023, CheckPoint Research released its findings on a new malware known as BundleBot. The report comes after CheckPoint keeping a close eye on this new threat and investigating it for several months....
The recent layoff wave in the IT industry has given rise to numerous employment scams, and the Zscaler Threatlabz team has recently discovered multiple fake job portals that masquerade as legitimate websites. These...
Proofpoint researchers have discovered a new hacking campaign executed by a hacker group named TA866. With known links to Russia, TA866 is an advanced hacking group that has the ability to perform well-organized...
According to a recent report by Moonlock Lab, a malicious python programming package known as “pymafka” was discovered on May 17 in the Python Package Index registry. The malicious package, which can infect...
The researchers at Avanan, a Checkpoint software company, have discovered a new malicious campaign targeting college students and aiming to steal their personal information. Attack methodology Hackers use phishing, a type of social...