As reported by BleepingComputer, a new FakeUpdate campaign has been spotted online by security researchers at Proofpoint.
CISOs need to warn employees in regular awareness training to refuse to copy and execute so-called verification login scripts ...
The FakeUpdate malware campaigns are increasingly becoming muddled, with two additional cybercrime groups tracked as TA2726 ...
Security experts have warned Windows users of a new data-stealing campaign that uses a dangerous CAPTCHA test to bypass ...
Threat actors are seen distributing the new macOS stealer in a web inject campaign, along with stealers for other operating ...
US military agencies and defense contractors hit by infostealer malware The malware can exfiltrate victim's data Researchers ...
Proofpoint also identified two new threat actors operating components of web inject campaigns, TA2726 and TA2727 ...
Hackers are distributing nearly 1,000 fake websites mimicking Reddit and WeTransfer to spread the Lumma Stealer malware. These sites are designed to trick you into downloading malicious software ...
TA2726, per the enterprise security firm, acts as a TDS for TA2727 and another threat actor called TA569, which is ...
A recently identified macOS infostealer named FrigidStealer has been distributed through a compromised website, as a fake browser update.
The majority of the targets seem to be located in North America and Europe, and besides FrigidStealer, the crooks are also using Lumma Stealer and DeerStealer for Windows targets, and Marcher ...
New Snake Keylogger variant evades detection using AutoIt, leading to 280M blocked attacks targeting Windows users across ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results