Malwar

    Audio player loading Cybersecurity researchers have identified a dangerous new malware subscription service capable of facilitating a wide variety of attacks.Branded the Eternity Project, the modular malware kit contains functionality that enables buyers ...
    A Tor-hidden website dubbed the Eternity Project is offering a toolkit of malware, including ransomware, worms, and – coming soon – distributed denial-of-service programs, at low prices.According to researchers at cyber-intelligence outfit Cyble, the Eter...
    Audio player loading Cybersecurity researchers have identified a dangerous new malware subscription service capable of facilitating a wide variety of attacks.Branded the Eternity Project, the modular malware kit contains functionality that enables buyers ...
    Malicious packages in the NPM Registry that security researchers for weeks believed were being used to stage supply-chain attacks against prominent industrial companies in Germany turned out to be part of a penetration test run by a cybersecurity company....
    A years-long campaign by miscreants to insert malicious JavaScript into vulnerable WordPress sites, so that visitors are redirected to scam websites, has been documented by reverse-engineers.An investigation by analysts at Sucuri into malware found on Wor...
    Roblox, a popular, kid-friendly online platform that lets users create immersive worlds and games for others to enjoy, may not be as innocuous as you think. Avanan, a cybersecurity firm, published a report about a nasty bug inside the game that could wrea...
    Roblox, a popular, kid-friendly online platform that lets users create immersive worlds and games for others to enjoy, may not be as innocuous as you think. Avanan, a cybersecurity firm, published a report about a nasty bug inside the game that could wrea...
    Audio player loading A brand new remote access trojan (RAT), rich in features, and distributed the old-fashioned Office macro way, has recently been spotted in the wild, researchers are saying.Cybersecurity researchers from Proofpoint recently discovered ...
    Black Hat Asia The advanced persistent threat gang known as SideWinder has gone on an attack spree in the last two years, conducting almost 1,000 raids and deploying increasingly sophisticated attack methods.Noushin Shaba, a senior security researcher on ...
    Malicious packages in the NPM Registry that security researchers for weeks believed were being used to stage supply-chain attacks against prominent industrial companies in Germany turned out to be part of a penetration test run by a cybersecurity company....
    Securing the software supply chain is admittedly somewhat of a dry topic, but knowing what components and code go into your everyday devices and appliances is a critical part of the software development process that billions of people rely on every day.So...
    Analysis NSO Group's Pegasus spyware-for-governments keeps returning to the headlines thanks to revelations such as its use against Spain's prime minister and senior British officials. But there's one nation where outrage about Pegasus has ...
    Audio player loading Researchers have found new malware that is attacking Windows devices, but theyre not yet sure why exactly it does what it does.Cybersecurity researchers from Red Canary recently discovered a new worm-like malware that spreads offline,...