Malware

SonicWall Patches Critical SMA 100 Vulnerability, Warns of Recent Malware Attack

SonicWall Patches Critical SMA 100 Vulnerability, Warns of Recent Malware Attack 2025-07-24 at 13:18 By Ionut Arghire SonicWall advises organizations to patch SMA 100 appliances and look for IoCs associated with Overstep malware attacks. The post SonicWall Patches Critical SMA 100 Vulnerability, Warns of Recent Malware Attack appeared first on SecurityWeek. This article is an […]

React to this headline:

Loading spinner

SonicWall Patches Critical SMA 100 Vulnerability, Warns of Recent Malware Attack Read More »

Coyote Banking Trojan First to Abuse Microsoft UIA

Coyote Banking Trojan First to Abuse Microsoft UIA 2025-07-23 at 16:20 By Eduard Kovacs Akamai’s analysis of the Coyote malware revealed that it abuses Microsoft’s UIA accessibility framework to obtain data. The post Coyote Banking Trojan First to Abuse Microsoft UIA appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source

React to this headline:

Loading spinner

Coyote Banking Trojan First to Abuse Microsoft UIA Read More »

Lumma Stealer Malware Returns After Takedown Attempt

Lumma Stealer Malware Returns After Takedown Attempt 2025-07-23 at 13:03 By Eduard Kovacs The Lumma Stealer is back after Microsoft and law enforcement took action to significantly disrupt the malware’s infrastructure. The post Lumma Stealer Malware Returns After Takedown Attempt appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React

React to this headline:

Loading spinner

Lumma Stealer Malware Returns After Takedown Attempt Read More »

AsyncRAT evolves as ESET tracks its most popular malware forks

AsyncRAT evolves as ESET tracks its most popular malware forks 2025-07-15 at 12:50 By Sinisa Markovic AsyncRAT is an open-source remote access trojan that first appeared on GitHub in 2019. It includes a range of typical RAT capabilities, such as keylogging, screen capture, credential theft, and more. Its simplicity and open-source design have made it

React to this headline:

Loading spinner

AsyncRAT evolves as ESET tracks its most popular malware forks Read More »

Hackers Inject Malware Into Gravity Forms WordPress Plugin 

Hackers Inject Malware Into Gravity Forms WordPress Plugin  2025-07-14 at 12:32 By Ionut Arghire Two Gravity Forms WordPress plugin versions available on the official download page were injected with malware in a supply chain attack. The post Hackers Inject Malware Into Gravity Forms WordPress Plugin  appeared first on SecurityWeek. This article is an excerpt from

React to this headline:

Loading spinner

Hackers Inject Malware Into Gravity Forms WordPress Plugin  Read More »

Ransomware drops, but don’t relax yet

Ransomware drops, but don’t relax yet 2025-07-14 at 07:44 By Help Net Security WatchGuard has released its latest Internet Security Report, covering malware, network, and endpoint threats spotted by its Threat Lab in the first quarter of 2025. The report shows a 171% jump in unique malware detections compared to the previous quarter, the highest

React to this headline:

Loading spinner

Ransomware drops, but don’t relax yet Read More »

Open source has a malware problem, and it’s getting worse

Open source has a malware problem, and it’s getting worse 2025-07-10 at 08:27 By Help Net Security Sonatype has published its Q2 2025 Open Source Malware Index, identifying 16,279 malicious open source packages across major ecosystems such as npm and PyPI. This brings the total number of malware packages discovered by the company to 845,204.

React to this headline:

Loading spinner

Open source has a malware problem, and it’s getting worse Read More »

You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code

You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code 2025-07-03 at 16:03 By Zeljka Zorz Popular AI chatbots powered by large language models (LLMs) often fail to provide accurate information on any topic, but researchers expect threat actors to ramp up their efforts to get them to spew

React to this headline:

Loading spinner

You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code Read More »

Undetectable Android Spyware Backfires, Leaks 62,000 User Logins

Undetectable Android Spyware Backfires, Leaks 62,000 User Logins 2025-07-03 at 14:32 By Ionut Arghire A vulnerability in the Catwatchful spyware allowed a security researcher to retrieve the usernames and passwords of over 62,000 accounts. The post Undetectable Android Spyware Backfires, Leaks 62,000 User Logins appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

Undetectable Android Spyware Backfires, Leaks 62,000 User Logins Read More »

North Korean Hackers Use Fake Zoom Updates to Install macOS Malware

North Korean Hackers Use Fake Zoom Updates to Install macOS Malware 2025-07-03 at 13:32 By Ionut Arghire SentinelOne says the fake Zoom update scam delivers ‘NimDoor’, a rare Nim-compiled backdoor. The post North Korean Hackers Use Fake Zoom Updates to Install macOS Malware appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source

React to this headline:

Loading spinner

North Korean Hackers Use Fake Zoom Updates to Install macOS Malware Read More »

RIFT: New open-source tool from Microsoft helps analyze Rust malware

RIFT: New open-source tool from Microsoft helps analyze Rust malware 2025-06-30 at 13:01 By Mirko Zorz Microsoft’s Threat Intelligence Center has released a new tool called RIFT to help malware analysts identify malicious code hidden in Rust binaries. While Rust is becoming more popular for its speed and memory safety, those same qualities make malware

React to this headline:

Loading spinner

RIFT: New open-source tool from Microsoft helps analyze Rust malware Read More »

Chinese Hackers Target Chinese Users With RAT, Rootkit

Chinese Hackers Target Chinese Users With RAT, Rootkit 2025-06-27 at 13:02 By Ionut Arghire China-linked Silver Fox hacking group is targeting Chinese users with fake installers carrying a RAT and a rootkit. The post Chinese Hackers Target Chinese Users With RAT, Rootkit appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original

React to this headline:

Loading spinner

Chinese Hackers Target Chinese Users With RAT, Rootkit Read More »

Hackers Abuse ConnectWise to Hide Malware

Hackers Abuse ConnectWise to Hide Malware 2025-06-25 at 15:52 By Ionut Arghire G Data has observed a surge in malware infections originating from ConnectWise applications with modified certificate tables. The post Hackers Abuse ConnectWise to Hide Malware appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to this headline:

React to this headline:

Loading spinner

Hackers Abuse ConnectWise to Hide Malware Read More »

SonicWall Warns of Trojanized NetExtender Stealing User Information

SonicWall Warns of Trojanized NetExtender Stealing User Information 2025-06-25 at 14:33 By Ionut Arghire SonicWall says a modified version of the legitimate NetExtender application contains information-stealing code. The post SonicWall Warns of Trojanized NetExtender Stealing User Information appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to this headline:

React to this headline:

Loading spinner

SonicWall Warns of Trojanized NetExtender Stealing User Information Read More »

Russian APT Hits Ukrainian Government With New Malware via Signal

Russian APT Hits Ukrainian Government With New Malware via Signal 2025-06-25 at 10:17 By Ionut Arghire Russia-linked APT28 deployed new malware against Ukrainian government targets through malicious documents sent via Signal chats. The post Russian APT Hits Ukrainian Government With New Malware via Signal appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

Russian APT Hits Ukrainian Government With New Malware via Signal Read More »

Prometei Botnet Activity Spikes

Prometei Botnet Activity Spikes 2025-06-24 at 14:10 By Ionut Arghire Palo Alto Networks has observed a spike in Prometei activity since March 2025, pointing to a resurgence of the botnet. The post Prometei Botnet Activity Spikes appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to this headline:

React to this headline:

Loading spinner

Prometei Botnet Activity Spikes Read More »

Chinese APT Hacking Routers to Build Espionage Infrastructure

Chinese APT Hacking Routers to Build Espionage Infrastructure 2025-06-24 at 13:15 By Ionut Arghire A Chinese APT has been infecting SOHO routers with the ShortLeash backdoor to build stealthy espionage infrastructure. The post Chinese APT Hacking Routers to Build Espionage Infrastructure appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source

React to this headline:

Loading spinner

Chinese APT Hacking Routers to Build Espionage Infrastructure Read More »

Godfather Android Trojan Creates Sandbox on Infected Devices

Godfather Android Trojan Creates Sandbox on Infected Devices 2025-06-20 at 14:50 By Ionut Arghire The Godfather Android trojan uses on-device virtualization to hijack legitimate applications and steal users’ funds. The post Godfather Android Trojan Creates Sandbox on Infected Devices appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to

React to this headline:

Loading spinner

Godfather Android Trojan Creates Sandbox on Infected Devices Read More »

Cloudflare Tunnels Abused in New Malware Campaign

Cloudflare Tunnels Abused in New Malware Campaign 2025-06-20 at 11:48 By Ionut Arghire A threat actor is abusing Cloudflare Tunnels for the delivery of a Python loader as part of a complex infection chain. The post Cloudflare Tunnels Abused in New Malware Campaign appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View

React to this headline:

Loading spinner

Cloudflare Tunnels Abused in New Malware Campaign Read More »

New Campaigns Distribute Malware via Open Source Hacking Tools

New Campaigns Distribute Malware via Open Source Hacking Tools 2025-06-19 at 15:40 By Ionut Arghire Trend Micro and ReversingLabs uncovered over 100 GitHub accounts distributing malware embedded in open source hacking tools. The post New Campaigns Distribute Malware via Open Source Hacking Tools appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View

React to this headline:

Loading spinner

New Campaigns Distribute Malware via Open Source Hacking Tools Read More »

Scroll to Top