Microsoft Word Documents Used as Lures to Distribute Nim-Based Malware
A recently identified phishing campaign is using decoy Microsoft Word documents as a lure to [...]
A recently identified phishing campaign is using decoy Microsoft Word documents as a lure to [...]
COLDRIVER, the threat actor, persists in carrying out credential theft operations targeting entities strategically significant [...]
Google Files Lawsuit Against Fraudsters Exploiting Bard's Genetics Artificial Intelligence Hype to Deceptively Distribute Malware. [...]
Cybersecurity researchers have issued a warning about a Windows variant of a malware called BiBi-Windows [...]
The latest iteration of GootLoader malware, known as GootBot, enables lateral movement within compromised systems [...]