Windows users are encountering a new run of malware that is infecting their PC by impersonating some of the system's most ...
Signed malware backed by a stolen EV certificate deployed legitimate RMM tools to gain persistent access inside enterprise ...
VOID#GEIST malware campaign delivers XWorm, AsyncRAT, and Xeno RAT using batch scripts, Python loaders, and explorer.exe ...
Hackers are abusing the legitimate OAuth redirection mechanism to bypass phishing protections in email and browsers to take ...
TrustConnect is back, this time used to deploy legitimate but weaponized RMM solutions.
Transparent Tribe uses AI tools to mass-produce polyglot malware targeting India using Slack, Discord, and Google Sheets C2.
Crims hope for payday from malicious payloads rather than stealing access tokens Microsoft has warned organizations about ...
OAuth redirection is being repurposed as a phishing delivery path. Trusted authentication flows are weaponized to move users ...
Researchers have found that attackers are abusing OAuth to send users from legitimate Microsoft or Google login pages to phishing sites or malware downloads.
Kaspersky reports that 44.99% of global email traffic was spam in 2025, with APAC as the top target for malicious attachments ...
Microsoft's Defender Security Research Team has identified a series of phishing campaigns in which an unknown attacker used digitally signed malware masked as common workplace applications to deploy ...
Cybersecurity researchers warn that Pakistan-linked hacking group APT36 is using artificial intelligence to generate large volumes of malware known as “vibeware”. The campaign targets Indian ...