Researchers at Zscaler ThreatLabz have found three malicious Bitcoin npm packages that are meant to implant malware named ...
A new wave of GoBruteforcer botnet malware attacks is targeting databases of cryptocurrency and blockchain projects on ...
Cybercriminals use ErrTraffic tool to automate malware distribution through fake browser error messages, with attacks ...
File-sharing platform ownCloud warned users today to enable multi-factor authentication (MFA) to block attackers using ...
Browser extensions turned malicious after years of legitimate operation in DarkSpectre campaign affecting millions. The ...
Being targeted by sophisticated spyware is relatively rare, but experts say that everyone needs to stay vigilant as this dangerous malware continues to proliferate worldwide. Spyware is so dangerous ...
Researchers uncovered 27 malicious npm packages used over five months to host phishing pages that steal credentials from ...
Expert Consumers has recognized Webroot as the leading tool for real-time malware defense in its 2025 malware scanner evaluation. The recognition comes as cybersecurity threats continue to escalate in ...
Threat actors have been observed leveraging malicious dropper apps masquerading as legitimate applications to deliver an Android SMS stealer dubbed Wonderland in mobile attacks targeting users in ...
Android users have been dealing with a steady rise in financial malware for years. Threats like Hydra, Anatsa, and Octo have shown how attackers can take over a phone, read everything on the screen, ...
A new Android banking Trojan called Herodotus mimics human behavior, such as random keystroke delays, to evade detection tools. The malware employs device-takeover tactics, including the abuse of ...