GhostPoster Malware Found in 17 Firefox Add-ons with 50,000+ Downloads
Dec 17, 2025Ravie LakshmananAd Fraud / Browser Security A new campaign named GhostPoster has leveraged logo files associated with 17...
Dec 17, 2025Ravie LakshmananAd Fraud / Browser Security A new campaign named GhostPoster has leveraged logo files associated with 17...
Key takeaways The TAOTH campaign leveraged an abandoned Sogou Zhuyin IME update server and spear-phishing operations to deliver multiple malware...
Key takeaways The TAOTH campaign leveraged an abandoned Sogou Zhuyin IME update server and spear-phishing operations to deliver multiple malware...
Threat actors with ties to the Qilin ransomware family have leveraged malware known as SmokeLoader along with a previously undocumented...
Play ransomware affiliate leveraged zero-day to deploy malware Pierluigi Paganini May 07, 2025 The Play ransomware gang exploited a high-severity Windows...
Artificial intelligence (AI) company Anthropic has revealed that unknown threat actors leveraged its Claude chatbot for an "influence-as-a-service" operation to...
A fresh malicious software initiative named SparkCat has utilized a collection of fraudulent applications on the app markets of both...
Utilizing a recent social manipulation strategy, malevolent actors have employed Microsoft Teams to enable the spread of the infamous DarkGate...
According to research by Group-IB, a widespread fraudulent scheme involved the exploitation of counterfeit trading apps on the Apple App...
Authorities in charge have reported the dismantling of a significant phishing campaign aimed at mobile phone credentials. The PhaaS platform,...
September 6, 2024Ravie LakshmananSoftware Security / Hacking Cybercriminals have frequently exploited typographical errors to deceive unsuspecting users into visiting harmful...
A group of hackers from North Korea has exploited a counterfeit Windows video conferencing application posing as FreeConference.com to infect...