A tampered copy of FileZilla quietly contacts attacker-controlled servers using encrypted DNS traffic that can slip past ...
A vigilante developer turns the tables on software pirates by distributing malware that prevents them from accessing pirated software sites in the future. Threat actors commonly use pirated software ...
New phishing attacks use a Windows zero-day vulnerability to drop the Qbot malware without displaying Mark of the Web security warnings. When files are downloaded from an untrusted remote location, ...
Hosted on MSN
Criminals are using a virtual hard disk image file to host and distribute dangerous malware
Forcepoint observes new phishing campaign distributing virtual hard disk files The files bypass security protections to deploy the VenomRAT Victims end up losing sensitive data, so be on your guard ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results