Cybersecurity firm Infoblox reveals that over 90 percent of parked domains now redirect visitors to scams and malware, making ...
A new variant of the MacSync Stealer uses a code-signed Swift application to get around Apple's macOS Gatekeeper protections.
A fast-moving spyware campaign has forced Apple, Google and the U.S. government into an unusually coordinated response, as federal officials warn organizations to either update Chrome and other ...
Learn how the ShadyPanda campaign turned trusted browser extensions into spyware and the steps security teams can take to ...
Cybersecurity researchers have disclosed details of a new fully-featured Windows backdoor called NANOREMOTE that uses the Google Drive API for command-and-control (C2) purposes. According to a report ...
Things get shady the moment you try to download the app. Instead of offering a normal installer file, the site tells users to paste a command into their terminal.
Abstract: Malware that takes advantage of security holes is one type of threat that can affect web-based apps. The above breaches have the potential to seriously impair the privacy, usability, and ...
A new Android malware family, promoted as a Malware-as-a-Service (MaaS), has surfaced on Russian-speaking cybercrime forums, offering full device takeover and real-time fraud capabilities. Known as ...