Report accuses China of extensive mobile spyware use to track ethnic minority group
A new blog post and research report from the Lookout Threat Intelligence Team has exposed the lengths to which a...
A new blog post and research report from the Lookout Threat Intelligence Team has exposed the lengths to which a...
Part 1: Detailed overview of Samsung's TrustZone components Part 2: Tools development for reverse-engineering and vulnerability research Part 3: Vulnerability...
The actors behind a campaign to spread GoldenSpy malware via tax accounting software used by customers of a Chinese bank...
After publishing a final security update for Magento 1 last week, Adobe is ending support for its popular 12-year-old ecommerce...
StrongPity, aka Promethium, a potentially state-sponsored APT group active since 2012, isn’t letting exposed campaigns in recent years stop it...
A tax software program installed by business clients of an unidentified Chinese bank was trojanized with malware that installs a...
The University of California, San Francisco (UCSF) ponied up a $1.4 million to hackers to retrieve data encrypted during a...
Glupteba malware does something novel: It uses the bitcoin blockchain as a communications channel to receive updated configuration information. That’s...
As you may have read in our previous blog post, the release of Triton v0.8 came with a lot of...
A military-themed malware campaign targeting military and government organizations in South Asia unleashes “maldocs” that spread full remote-access trojan (RAT)...
Researchers have discovered a new variant of Shlayer Mac malware that bypasses Apple’s built-in security protections and is being spread...
Researchers at Awake Security have made news over the past 24 hours exposing a scheme in which some 79 malicious...
“Two can play at this game…” Cybersecurity is a non-stop arms race between white hats and malicious hackers, and the...
A cyber espionage operation used fake job offers, sent via LinkedIn messages, to target employees at aerospace and military companies...
By malware standards, the banking trojan Qbot is long in the tooth, but it still has some bite, according to...
A malware campaign is abusing the popular machine-learning (ML) framework Kubeflow in order to target Kubernetes clusters with a crypto...
The Gamaredon threat group has built a post-compromise tool arsenal that includes remote template injectors for Word and Excel documents...
Scammers often craft social engineering schemes around major crises and news events, as demonstrated by the wealth of coronavirus-themed phishing...
Introduction Fuchsia is a new operating system developed by Google, targeting the AArch64 and x86_64 architectures. While little is known...
A pair of Android barcode reader apps that were downloaded more than 1 million times were found to contain ad...
Researchers have uncovered a new “enterprise-grade” backdoor malware program that they say shares code with the notorious modular banking trojan...
International equipment and software suppliers for the industrial sector last May suffered targeted malware attacks that employed numerous unconventional techniques to evade detection,...
Twenty-six open-source projects hosted on GitHub repositories were found to be infected with malware and capable of serving up weaponized...
More details have emerged about hacker group “Shiny Hunters’” prey this past month of more than 11 website victims, including...