Tag: Malware

Koske Malware Detection: New AI-Generated Linux Threat in the Wild 5 min read Latest Threats Koske Malware Detection: New AI-Generated Linux Threat in the Wild by Veronika Telychko CyberLock, Lucky_Gh0$t, and Numero Detection: Hackers Weaponize Fake AI Tool Installers in Ransomware and Malware Attacks 5 min read Latest Threats CyberLock, Lucky_Gh0$t, and Numero Detection: Hackers Weaponize Fake AI Tool Installers in Ransomware and Malware Attacks by Veronika Telychko Noodlophile Stealer Detection: Novel Malware Distributed Through Fake AI Video Generation Tools  4 min read Latest Threats Noodlophile Stealer Detection: Novel Malware Distributed Through Fake AI Video Generation Tools  by Veronika Telychko CoffeeLoader Detection: A New Sophisticated Malware Family Spread via SmokeLoader 4 min read Latest Threats CoffeeLoader Detection: A New Sophisticated Malware Family Spread via SmokeLoader by Veronika Telychko Operation AkaiRyÅ« Attacks Detection: China-Backed MirrorFace APT Targets Central European Diplomatic Institute Using ANEL Backdoor 4 min read Latest Threats Operation AkaiRyÅ« Attacks Detection: China-Backed MirrorFace APT Targets Central European Diplomatic Institute Using ANEL Backdoor by Daryna Olyniychuk Lumma Stealer Detection: Sophisticated Campaign Using GitHub Infrastructure to Spread SectopRAT, Vidar, Cobeacon, and Other Types of Malware 3 min read Latest Threats Lumma Stealer Detection: Sophisticated Campaign Using GitHub Infrastructure to Spread SectopRAT, Vidar, Cobeacon, and Other Types of Malware by Veronika Telychko TorNet Backdoor Detection: An Ongoing Phishing Email Campaign Uses PureCrypter Malware to Drop Other Payloads 4 min read Latest Threats TorNet Backdoor Detection: An Ongoing Phishing Email Campaign Uses PureCrypter Malware to Drop Other Payloads by Veronika Telychko Detect Banshee Stealer: Stealthy Apple macOS Malware Evades Detection Using XProtect Encryption 4 min read Latest Threats Detect Banshee Stealer: Stealthy Apple macOS Malware Evades Detection Using XProtect Encryption by Daryna Olyniychuk EAGERBEE Malware Detection: New Backdoor Variant Targets Internet Service Providers and State Bodies in the Middle East 3 min read Latest Threats EAGERBEE Malware Detection: New Backdoor Variant Targets Internet Service Providers and State Bodies in the Middle East by Daryna Olyniychuk NonEuclid RAT Detection: Malware Enables Adversaries to Gain Unauthorized Remote Access and Control Over a Targeted System 4 min read Latest Threats NonEuclid RAT Detection: Malware Enables Adversaries to Gain Unauthorized Remote Access and Control Over a Targeted System by Veronika Telychko