Malware

Malware detection, analysis, and removal guides for IT security.

22Articles
893Topics

Articles with this Tag

Sandworm's DynoWiper Malware Targets Polish Power SectorSecurity

Sandworm's DynoWiper Malware Targets Polish Power Sector

Sandworm's DynoWiper malware targets Polish power sector in attempted cyber attack

North Korea–Linked "Contagious Interview" Hackers Abuse VS Code Projects to Execute Backdoors When Developers Trust ReposSecurity

North Korea–Linked "Contagious Interview" Hackers Abuse VS Code Projects to Execute Backdoors When Developers Trust Repos

DPRK-linked actors behind the long-running Contagious Interview campaign are pushing malicious Git r...

CrashFix Chrome Extension Campaign Delivers ModeloRAT via "ClickFix" Browser-Crash LuresSecurity

CrashFix Chrome Extension Campaign Delivers ModeloRAT via "ClickFix" Browser-Crash Lures

A fake Chrome ad blocker crashes browsers to push ClickFix commands, then deploys ModeloRAT on domai...

Explainer

Basics of Cybersecurity (2026): A Premium Beginner Explainer (That Actually Teaches You)

A complete beginner explainer: how cyberattacks really happen, CIA triad, the 6-step attack chain, Z...

RustyWater RAT: MuddyWater Deploys New Rust Backdoor Targeting Middle EastSecurity

RustyWater RAT: MuddyWater Deploys New Rust Backdoor Targeting Middle East

Iranian APT group MuddyWater deploys RustyWater, a new RAT written in Rust, via sophisticated spear-...

PHALT#BLYX: Fake Booking.com Emails and ClickFix BSoD Trap Deploy DCRat Malware on Hotel SystemsSecurity

PHALT#BLYX: Fake Booking.com Emails and ClickFix BSoD Trap Deploy DCRat Malware on Hotel Systems

Threat actors are weaponizing fake Booking.com reservation cancellations and simulated Blue Screen o...

Phantom Shuttle: Fake VPN Chrome Extensions Steal Credentials from 170+ High-Value DomainsSecurity

Phantom Shuttle: Fake VPN Chrome Extensions Steal Credentials from 170+ High-Value Domains

Two identically-named Chrome extensions masquerading as legitimate VPN services have been secretly i...

What Is Ransomware and How to Protect Against ItExplainer

What Is Ransomware and How to Protect Against It

Ransomware has evolved from a billion-dollar criminal enterprise that can cripple organizations in m...

GoBruteforcer Botnet Targets Crypto and Blockchain Projects in New Attack WaveSecurity

GoBruteforcer Botnet Targets Crypto and Blockchain Projects in New Attack Wave

Security researchers have uncovered an evolved version of the GoBruteforcer botnet actively targetin...

ownCloud Warns of Massive Credential Theft: Enable MFA ImmediatelySecurity

ownCloud Warns of Massive Credential Theft: Enable MFA Immediately

ownCloud has issued an urgent security advisory following a Hudson Rock report revealing that dozens...

Kimwolf Botnet Weaponizes Residential Proxies to Infiltrate Your Home NetworkSecurity

Kimwolf Botnet Weaponizes Residential Proxies to Infiltrate Your Home Network

A massive new botnet is rewriting the rules of network security. Kimwolf exploits a vulnerability in...

ClickFix Malware Uses Fake Windows Update Screens to Infect PCsSecurity

ClickFix Malware Uses Fake Windows Update Screens to Infect PCs

New variants of ClickFix social engineering attacks are evolving to use fake Windows Update and BSOD...

VS Code Extensions Supply Chain Risk: Developer IDE AttacksSecurity

VS Code Extensions Supply Chain Risk: Developer IDE Attacks

Security researchers have uncovered widespread risks in Visual Studio Code extensions, where leaked ...

Streaming Platform Halts Live Streams After Content Injection AttackSecurity

Streaming Platform Halts Live Streams After Content Injection Attack

A prominent live-streaming platform abruptly stopped all live broadcasts following a cyberattack tha...

GlassWorm Malware Targets macOS via Trojanized Crypto WalletsSecurity

GlassWorm Malware Targets macOS via Trojanized Crypto Wallets

A new macOS-focused malware campaign dubbed GlassWorm is spreading through trojanized cryptocurrency...

RondoDox Botnet Exploits React2Shell to Breach Next.jsSecurity

RondoDox Botnet Exploits React2Shell to Breach Next.js

Security researchers have identified an active campaign where the RondoDox botnet exploits the React...

ErrTraffic fuels ClickFix scams with fake browser errorsSecurity

ErrTraffic fuels ClickFix scams with fake browser errors

A new service dubbed ErrTraffic is being promoted as a turnkey way to run “ClickFix” social-engineer...

Zoom Stealer extensions steal meeting data from 2.2MSecurity

Zoom Stealer extensions steal meeting data from 2.2M

Security researchers have uncovered a browser-extension campaign dubbed “Zoom Stealer” that collecte...

Trust Wallet Users Hit by $7M Crypto Theft Across 2,596 WalletsSecurity

Trust Wallet Users Hit by $7M Crypto Theft Across 2,596 Wallets

Trust Wallet has confirmed a large-scale crypto theft campaign that drained 2,596 wallets, stealing ...

Hacker Arrested After KMSAuto Malware Hits 28 Million DownloadsSecurity

Hacker Arrested After KMSAuto Malware Hits 28 Million Downloads

A Russian man has been arrested for running a widespread malware campaign disguised as Windows activ...

Typosquatted Windows Activation Domain Used to Spread PowerShell MalwareSecurity

Typosquatted Windows Activation Domain Used to Spread PowerShell Malware

A typosquatted domain mimicking Microsoft’s official Windows activation script site has been used to...

macOS Malware MacSync Stealer Bypasses Gatekeeper, Evades Apple ProtectionSecurity

macOS Malware MacSync Stealer Bypasses Gatekeeper, Evades Apple Protection

A newly identified macOS malware variant known as MacSync Stealer is abusing Apple’s code-signing an...