IT professionals and decision-makers from across the Microsoft ecosystem gathered at m365con to examine real-world challenges ...
New ClickFix variant maps WebDAV drive to run trojanized WorkFlowy app, enabling stealth C2 beacon and payload delivery.
The LeakNet ransomware gang is now using the ClickFix technique for initial access into corporate environments and deploys a ...
AI-generated Slopoly malware used by Hive0163 in 2026 attacks maintained access for over a week, highlighting how AI ...
A new malware strain dubbed Slopoly, likely created using generative AI tools, allowed a threat actor to remain on a compromised server for more than a week and steal data in an Interlock ransomware ...
Hundreds of GitHub repositories seemingly offering “free game cheats” deliver malware, including the Vidar infostealer, ...
BlackSanta is a malware module that kills EDR and AV at the kernel level prior to unleashing the malware’s final purpose.
A significant shift in attack methodology, moving away from conventional techniques to leverage legitimate system tools.
The state-sponsored hackers deployed custom tools and stayed dormant in the compromised environments for months.
Ransomware criminals exploited CVE-2026-20131, a maximum-severity bug in Cisco Secure Firewall Management Center software, as ...
A compromised Chrome extension with 7,000 users was updated to deploy malware, strip security headers, and steal cryptocurrency wallet seed phrases.
Gesture control robotics replaces traditional buttons and joysticks with natural hand movements. This approach improves user ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results