Malware

Application security trends: Shift-left security, AI, and open source malware
Software is at the heart of business operations across most industries, which means application security has never been more critical. However, as organizations embrace cloud-native architectures, microservices, and open source components, the ...

Hackers Use Trump’s Coin, Binance’s Name in Crypto Phishing Scam
Threat actors are running an email phishing scam to entice victims to install Binance software in hopes of collecting TRUMP coins. However, if they try, they instead get the ConnectWise RAT installed ...

Suspected North Korea Group Targets Android Devices with Spyware
A North Korea-backed threat group, APT37, disguised KoSpy as utility apps in Google Play to infect Android devices, using the spyware for such activities as gathering sensitive information, tracking locations, capturing screenshots, ...

No, Elon — X DDoS was NOT by Ukraine
X marks the botnet: Outage outrage was a Ukrainian cyberattack, implies our favorite African billionaire comedy villain ...

What is Rootkit – Detection and Prevention
The intricacy of cyberattacks is growing. Imagine a stealthy cyberattack that infiltrates your network, computers, etc, hides malicious software, and silently dismantles your defenses without detection. This is how the rootkit works ...

Microsoft: Massive Malvertising Campaign Infects a Million Devices
A massive malvertising campaign that targeted individuals watching pirated videos on illegal streaming sites redirected them several times before landing them at GitHub repositories that hosted infostealers and other malware, according to ...

The hidden threat: Tackling malware in your software supply chain
The value of open source is undeniable — 90% of all modern software development depends on it. According to Harvard Business School, in 2024 alone, more than 6 trillion open source software ...
How Threat Actors Use Artificial Intelligence (AI) to Outsmart Your Defenses and Cybersecurity Solution
Introduction Artificial Intelligence (AI) is revolutionizing cybersecurity, providing advanced threat detection, automated responses, and predictive analytics. However, the same technology is also being weaponized by cybercriminals to launch more sophisticated, evasive, and ...

Security Pros Push Back as Trump Orders Halt to Cyber Ops vs. Russia
The Trump Administration's orders to the DoD and CISA to halt cyber operations and investigations against Russia is a gift to the United States' longtime foreign adversary and makes the country less ...

Apple Lets Stalkers Find YOU — ‘nRootTag’ Team Breaks AirTag Crypto
Dumb Design + Crud Code = Privacy Panic: It’s been SEVEN MONTHS, but Tim’s crew is yet to fix the bugs ...