Hackers are impersonating IT staff in Microsoft Teams to trick employees into installing malware, giving attackers stealthy access to corporate networks.
OAuth redirection is being repurposed as a phishing delivery path. Trusted authentication flows are weaponized to move users ...
Malware is evolving to evade sandboxes by pretending to be a real human behind the keyboard. The Picus Red Report 2026 shows 80% of top attacker techniques now focus on evasion and persistence, ...
A cyber-attack on a US-based accounting firm in May 2025 has been observed delivering the PureRAT remote access Trojan using a sophisticated crypter called Ghost Crypt. According to researchers at ...
Google detected novel adaptive malware in the wild. This new malware uses LLMs to dynamically generate code. Google also listed other new key trends in cyberattacks. The use of artificial intelligence ...
Hackers have a new tool called ClickFix. The new attack vector combines fake human-verification prompts with malware, trying to trick users into running Terminal commands that bypass macOS security.
Crocodilus malware is a recent threat targeting Android cellular devices. It focuses on apps linked to financial assets, including crypto wallets and banking platforms. Crocodilus gains access to the ...
A new report out today from Fortinet Inc.’s FortiGuard Labs is warning of two newly discovered malicious Python packages that pose a high risk of credential theft, data exfiltration and unauthorized ...
Key Takeaways A properly configured virtual lab keeps malware contained and prevents damage to systems.Hashing, static review, and dynamic testing need to be us ...