Fake CAPTCHA IRSF Scam and 120 Keitaro Campaigns Drive Global SMS, Crypto Fraud
Cybersecurity researchers have disclosed details of a telecommunications fraud campaign that uses fake CAPTCHA verification tricks to dupe unsuspecting users...
Cybersecurity researchers have disclosed details of a telecommunications fraud campaign that uses fake CAPTCHA verification tricks to dupe unsuspecting users...
Ravie LakshmananApr 24, 2026Malware / Threat Intelligence Chinese-speaking individuals are the target of a new campaign that uses a trojanized...
Fast-moving Storm-1175 uses new exploits to breach networks and drop Medusa Pierluigi Paganini April 07, 2026 China-based actor Storm-1175 runs...
GPUBreach exploit uses GPU memory bit-flips to achieve full system takeover Pierluigi Paganini April 07, 2026 GPUBreach attack technique uses...
This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies...
Chinese-speaking users are the target of an active campaign that uses typosquatted domains impersonating trusted software brands to deliver a...
New macOS Infinity Stealer uses Nuitka Python payload and ClickFix Pierluigi Paganini March 30, 2026 Infinity Stealer targets macOS via...
Russia-linked APT TA446 uses DarkSword exploit to target iPhone users in phishing wave Pierluigi Paganini March 30, 2026 Russia-linked TA446...
This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies...
This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies...
Russia-linked APT uses DRILLAPP backdoor to spy on Ukrainian targets Pierluigi Paganini March 16, 2026 Russia-linked threat actors target Ukrainian...
This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies...
Cybersecurity researchers have disclosed details of a multi-stage malware campaign that uses batch scripts as a pathway to deliver various...
This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies...
Cybersecurity researchers have disclosed details of a new cryptojacking campaign that uses pirated software bundles as lures to deploy a...