Researchers uncover APT28-linked phishing attacks against Ukrainian targets deploying BadPaw loader and MeowMeow backdoor for ...
A general desktop emulator (like xAI’s Macrohard, which emulates keystrokes, mouse movements, and screen interactions) could vastly expand beyond VBScript/Unix scripting, which are limited to ...
Threat actors are using novel living-off-the-land (LOTL) tactics to better evade detection, according to HP Wolf’s Q2 2025 Threat Insights Report. These tactics include the growing use of multiple, ...
Attackers are abusing legitimate remote access tools and lightweight scripts to deliver AsyncRAT entirely in memory, bypassing file-based detection. Security researchers have discovered an open-source ...
The big picture: The Windows ecosystem has offered an unparalleled level of backward compatibility for decades. However, Microsoft is now working to remove as many legacy technologies as possible in ...
Since Russia’s full-scale invasion of Ukraine in February 2022, cyberespionage has played a crucial role in the broader threatscape. Russia-aligned advanced persistent threat (APT) groups have ...
The Russia-aligned APT known as Gamaredon is using sophisticated spear-phishing attacks to target Ukrainian government entities, after previously expanding its targeting to NATO countries. That's ...
Remcos RAT gets a stealthy upgrade as attackers ditch old office exploits for a fileless PowerShell loader that runs entirely in memory. Threat actors have been spotted using a PowerShell-based ...
A new social engineering tactic, known as ClickFix, has emerged, using deceptive error messages to prompt users to run harmful code. The Sekoia Threat Detection ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results