Malware - Latest Cybersecurity News
Back to Home
-
Scammers pose as Amazon support to steal your account - Thu, 09 Apr 2026 09:05 - Source: Malwarebytes
-
Scammers pose as Amazon support to steal your account - Thu, 09 Apr 2026 09:05 - Source: Malwarebytes
-
NSFW app leak exposes 70,000 prompts linked to individual users - Thu, 09 Apr 2026 07:02 - Source: Malwarebytes
-
NSFW app leak exposes 70,000 prompts linked to individual users - Thu, 09 Apr 2026 07:02 - Source: Malwarebytes
-
30,000 private Facebook images allegedly downloaded by Meta employee - Thu, 09 Apr 2026 06:07 - Source: Malwarebytes
-
30,000 private Facebook images allegedly downloaded by Meta employee - Thu, 09 Apr 2026 06:07 - Source: Malwarebytes
-
This fake Windows support website delivers password-stealing malware - Thu, 09 Apr 2026 05:40 - Source: Malwarebytes
-
This fake Windows support website delivers password-stealing malware - Thu, 09 Apr 2026 05:40 - Source: Malwarebytes
-
Your extensions leak clues about you, so we made sure Browser Guard doesn’t - Wed, 08 Apr 2026 10:33 - Source: Malwarebytes
-
Your extensions leak clues about you, so we made sure Browser Guard doesn’t - Wed, 08 Apr 2026 10:33 - Source: Malwarebytes
-
Russian hacking group targets home and small office routers to spy on users - Wed, 08 Apr 2026 09:31 - Source: Malwarebytes
-
Russian hacking group targets home and small office routers to spy on users - Wed, 08 Apr 2026 09:31 - Source: Malwarebytes
-
Timeshare owners warned to watch out for cartel-linked scams - Wed, 08 Apr 2026 06:25 - Source: Malwarebytes
-
Timeshare owners warned to watch out for cartel-linked scams - Wed, 08 Apr 2026 06:25 - Source: Malwarebytes
-
China-Linked Storm-1175 Exploits Zero-Days to Rapidly Deploy Medusa Ransomware - Tue, 07 Apr 2026 23:17 - Source: The Cyber Post
-
EP 172: SuperBox - Tue, 07 Apr 2026 21:55 - Source: The Cyber Post
-
Traffic violation scams swap links for QR codes to steal your card details - Tue, 07 Apr 2026 07:57 - Source: Malwarebytes
-
Traffic violation scams swap links for QR codes to steal your card details - Tue, 07 Apr 2026 07:57 - Source: Malwarebytes
-
Support platform breach exposes Hims & Hers customer data - Tue, 07 Apr 2026 06:45 - Source: Malwarebytes
-
Support platform breach exposes Hims & Hers customer data - Tue, 07 Apr 2026 06:45 - Source: Malwarebytes
-
BKA Identifies REvil Leaders Behind 130 German Ransomware Attacks - Mon, 06 Apr 2026 23:18 - Source: The Cyber Post
-
Qilin and Warlock Ransomware Use Vulnerable Drivers to Disable 300+ EDR Tools - Mon, 06 Apr 2026 23:17 - Source: The Cyber Post
-
Iran-Linked Password-Spraying Campaign Targets 300+ Israeli Microsoft 365 Organizations - Mon, 06 Apr 2026 23:17 - Source: The Cyber Post
-
Claude Code Packaging Error Remains a Lure in an Active Campaign: What Defenders Should Do - Mon, 06 Apr 2026 20:00 - Source: Trend Micro Research, News and Perspectives
-
2026-04-06: SmartApeSG activity - Mon, 06 Apr 2026 17:45 - Source: Malware-Traffic-Analysis.net - Blog Entries
-
A week in security (March 30 – April 5) - Mon, 06 Apr 2026 03:01 - Source: Malwarebytes
-
A week in security (March 30 – April 5) - Mon, 06 Apr 2026 03:01 - Source: Malwarebytes
-
Anthropic Claude Mythos Preview: The More Capable AI Becomes, the More Security It Needs - Mon, 06 Apr 2026 00:00 - Source: Blog
-
Killer robots are here. Now what? (Lock and Code S07E07) - Sun, 05 Apr 2026 19:10 - Source: Malwarebytes
-
Killer robots are here. Now what? (Lock and Code S07E07) - Sun, 05 Apr 2026 19:10 - Source: Malwarebytes
-
How CrowdStrike Is Accelerating Exposure Evaluation as Adversaries Gain Speed - Sun, 05 Apr 2026 03:00 - Source: Blog
-
That dream job offer from Coca-Cola or Ferrari? It’s a trap for your passwords - Fri, 03 Apr 2026 19:13 - Source: Malwarebytes
-
That dream job offer from Coca-Cola or Ferrari? It’s a trap for your passwords - Fri, 03 Apr 2026 19:13 - Source: Malwarebytes
-
Blocking children from social media is a badly executed good idea - Fri, 03 Apr 2026 10:37 - Source: Malwarebytes
-
Blocking children from social media is a badly executed good idea - Fri, 03 Apr 2026 10:37 - Source: Malwarebytes
-
ThreatsDay Bulletin: Pre-Auth Chains, Android Rootkits, CloudTrail Evasion & 10 More Stories - Thu, 02 Apr 2026 23:17 - Source: The Cyber Post
-
Weaponizing Trust Signals: Claude Code Lures and GitHub Release Payloads - Thu, 02 Apr 2026 20:00 - Source: Trend Micro Research, News and Perspectives
-
Apple expands “DarkSword” patches to iOS 18.7.7 - Thu, 02 Apr 2026 10:13 - Source: Malwarebytes
-
Apple expands “DarkSword” patches to iOS 18.7.7 - Thu, 02 Apr 2026 10:13 - Source: Malwarebytes
-
Malwarebytes Privacy VPN receives full third-party audit - Thu, 02 Apr 2026 09:00 - Source: Malwarebytes
-
Malwarebytes Privacy VPN receives full third-party audit - Thu, 02 Apr 2026 09:00 - Source: Malwarebytes
-
Wikipedia’s AI agent row likely just the beginning of the bot-ocalypse - Wed, 01 Apr 2026 17:49 - Source: Malwarebytes
-
Wikipedia’s AI agent row likely just the beginning of the bot-ocalypse - Wed, 01 Apr 2026 17:49 - Source: Malwarebytes
-
WhatsApp on Windows users targeted in new campaign, warns Microsoft - Wed, 01 Apr 2026 10:27 - Source: Malwarebytes
-
WhatsApp on Windows users targeted in new campaign, warns Microsoft - Wed, 01 Apr 2026 10:27 - Source: Malwarebytes
-
Why we’re still not doing April Fools’ Day - Wed, 01 Apr 2026 09:00 - Source: Malwarebytes
-
Why we’re still not doing April Fools’ Day - Wed, 01 Apr 2026 09:00 - Source: Malwarebytes
-
STARDUST CHOLLIMA Likely Compromises Axios npm Package - Wed, 01 Apr 2026 01:00 - Source: Blog
-
Falcon for IT Supports Windows Secure Boot Certificate Lifecycle Management - Wed, 01 Apr 2026 01:00 - Source: Blog
-
TrendAI Insight: New U.S. National Cyber Strategy - Tue, 31 Mar 2026 20:00 - Source: Trend Micro Research, News and Perspectives
-
Asking AI for personal advice is a bad idea, Stanford study shows - Tue, 31 Mar 2026 15:40 - Source: Malwarebytes
-
Asking AI for personal advice is a bad idea, Stanford study shows - Tue, 31 Mar 2026 15:40 - Source: Malwarebytes
-
Axios supply chain attack chops away at npm trust - Tue, 31 Mar 2026 10:53 - Source: Malwarebytes
-
Axios supply chain attack chops away at npm trust - Tue, 31 Mar 2026 10:53 - Source: Malwarebytes
-
Detecting CVE-2026-20929: Kerberos Authentication Relay via CNAME Abuse - Tue, 31 Mar 2026 01:00 - Source: Blog
-
Russian CTRL Toolkit Delivered via Malicious LNK Files Hijacks RDP via FRP Tunnels - Mon, 30 Mar 2026 23:19 - Source: The Cyber Post
-
DeepLoad Malware Uses ClickFix and WMI Persistence to Steal Browser Credentials - Mon, 30 Mar 2026 23:18 - Source: The Cyber Post
-
TrendAI™ Research at RSAC 2026: Advancing Defense Across AI‑Driven and Cyber‑Physical Threats - Mon, 30 Mar 2026 20:00 - Source: Trend Micro Research, News and Perspectives
-
The Real Risk of Vibecoding - Mon, 30 Mar 2026 20:00 - Source: Trend Micro Research, News and Perspectives
-
Axios NPM Package Compromised: Supply Chain Attack Hits JavaScript HTTP Client with 100M+ Weekly Downloads - Mon, 30 Mar 2026 20:00 - Source: Trend Micro Research, News and Perspectives
-
TeamPCP’s Telnyx Attack Marks a Shift in Tactics Beyond LiteLLM - Sun, 29 Mar 2026 20:00 - Source: Trend Micro Research, News and Perspectives
-
Bearlyfy Hits Russian Firms with Custom GenieLocker Ransomware - Fri, 27 Mar 2026 23:20 - Source: The Cyber Post
-
We Are At War - Fri, 27 Mar 2026 23:19 - Source: The Cyber Post
-
Pawn Storm Campaign Deploys PRISMEX, Targets Government and Critical Infrastructure Entities - Wed, 25 Mar 2026 20:00 - Source: Trend Micro Research, News and Perspectives
-
Your AI Gateway Was a Backdoor: Inside the LiteLLM Supply Chain Compromise - Wed, 25 Mar 2026 20:00 - Source: Trend Micro Research, News and Perspectives
-
How Charlotte AI AgentWorks Fuels Security's Agentic Ecosystem - Wed, 25 Mar 2026 01:00 - Source: Blog
-
Your AI Stack Just Handed Over Your Root Keys: Inside the litellm PyPI Breach - Tue, 24 Mar 2026 20:00 - Source: Trend Micro Research, News and Perspectives
-
CrowdStrike Flex for Services Expands Access to Elite Security Expertise - Tue, 24 Mar 2026 01:00 - Source: Blog
-
Falcon Data Security Secures Data Wherever It Lives and Moves - Tue, 24 Mar 2026 01:00 - Source: Blog
-
CrowdStrike Advances CNAPP with Industry-First Adversary-Informed Risk Prioritization - Tue, 24 Mar 2026 01:00 - Source: Blog
-
CrowdStrike Services and Agentic MDR Put the Agentic SOC in Reach - Tue, 24 Mar 2026 01:00 - Source: Blog
-
MSSQLand – Lightweight MS-SQL Interaction Tool for Lateral Movement and Post-Exploitation - Mon, 23 Mar 2026 21:00 - Source: Darknet – Hacking Tools, Hacker News & Cyber Security
-
Building an Adversarial Consensus Engine | Multi-Agent LLMs for Automated Malware Analysis - Thu, 19 Mar 2026 06:00 - Source: SentinelLabs - We are hunters, reversers, exploit developers, and tinkerers shedding light on the world of malware, exploits, APTs, and cybercrime across all platforms.
-
2026-03-17: Seven days of scans and probes and web traffic hitting my web server - Wed, 18 Mar 2026 21:52 - Source: Malware-Traffic-Analysis.net - Blog Entries
-
Copyright Lures Mask a Multi‑Stage PureLog Stealer Attack on Key Industries - Wed, 18 Mar 2026 20:00 - Source: Trend Micro Research, News and Perspectives
-
2026-03-12: Files for an ISC diary (SmartApeSG ClickFix pushes Remcos RAT) - Wed, 18 Mar 2026 11:42 - Source: Malware-Traffic-Analysis.net - Blog Entries
-
Why East-West Visibility Matters for Grid Security - Tue, 17 Mar 2026 20:00 - Source: Trend Micro Research, News and Perspectives
-
From Misconfigured Spring Boot Actuator to SharePoint Exfiltration: How Stolen Credentials Bypass MFA - Tue, 17 Mar 2026 20:00 - Source: Trend Micro Research, News and Perspectives
-
LABScon25 Replay | Your Apps May Be Gone, But the Hackers Made $9 Billion and They’re Still Here - Tue, 17 Mar 2026 09:00 - Source: SentinelLabs - We are hunters, reversers, exploit developers, and tinkerers shedding light on the world of malware, exploits, APTs, and cybercrime across all platforms.
-
Web Shells, Tunnels, and Ransomware: Dissecting a Warlock Attack - Sun, 15 Mar 2026 20:00 - Source: Trend Micro Research, News and Perspectives
-
Securing Autonomous AI Agents with TrendAI & NVIDIA OpenShell - Sun, 15 Mar 2026 20:00 - Source: Trend Micro Research, News and Perspectives
-
TrendAI™ Supports Global Law Enforcement Efforts - Sun, 15 Mar 2026 20:00 - Source: Trend Micro Research, News and Perspectives
-
Credential Stuffing in 2025 – How Combolists, Infostealers and Account Takeover Became an Industry - Tue, 10 Mar 2026 21:00 - Source: Darknet – Hacking Tools, Hacker News & Cyber Security
-
CISOs in a Pinch: A Security Analysis of OpenClaw - Mon, 09 Mar 2026 20:00 - Source: Trend Micro Research, News and Perspectives
-
Through the Lens of MDR: Analysis of KongTuke’s ClickFix Abuse of Compromised WordPress Sites - Mon, 09 Mar 2026 20:00 - Source: Trend Micro Research, News and Perspectives
-
From Narrative to Knowledge Graph | LLM-Driven Information Extraction in Cyber Threat Intelligence - Mon, 09 Mar 2026 06:00 - Source: SentinelLabs - We are hunters, reversers, exploit developers, and tinkerers shedding light on the world of malware, exploits, APTs, and cybercrime across all platforms.
-
DumpBrowserSecrets – Browser Credential Harvesting with App-Bound Encryption Bypass - Sun, 08 Mar 2026 21:00 - Source: Darknet – Hacking Tools, Hacker News & Cyber Security
-
TrendAI™ at [un]prompted 2026: From KYC Exploits to Agentic Defense - Sun, 08 Mar 2026 20:00 - Source: Trend Micro Research, News and Perspectives
-
New BoryptGrab Stealer Targets Windows Users via Deceptive GitHub Pages - Wed, 04 Mar 2026 19:00 - Source: Trend Micro Research, News and Perspectives
-
Europol, Microsoft, TrendAI™ and Collaborators Halt Tycoon 2FA Operations - Tue, 03 Mar 2026 19:00 - Source: Trend Micro Research, News and Perspectives
-
Claude Code Security set the Cybersecurity Stocks on Fire - Here's the Signal in the Smoke - Mon, 02 Mar 2026 19:00 - Source: Trend Micro Research, News and Perspectives
-
Malicious OpenClaw Skills Used to Distribute Atomic macOS Stealer - Sun, 22 Feb 2026 19:00 - Source: Trend Micro Research, News and Perspectives
-
Spam Campaign Abuses Atlassian Jira, Targets Government and Corporate Entities - Mon, 16 Feb 2026 19:00 - Source: Trend Micro Research, News and Perspectives
-
U.S. Public Sector Under Siege - Thu, 05 Feb 2026 19:00 - Source: Trend Micro Research, News and Perspectives
-
Viral AI, Invisible Risks: What OpenClaw Reveals About Agentic Assistants - Thu, 05 Feb 2026 19:00 - Source: Trend Micro Research, News and Perspectives
-
Silent Brothers | Ollama Hosts Form Anonymous AI Network Beyond Platform Guardrails - Thu, 29 Jan 2026 05:55 - Source: SentinelLabs - We are hunters, reversers, exploit developers, and tinkerers shedding light on the world of malware, exploits, APTs, and cybercrime across all platforms.
-
PeckBirdy: A Versatile Script Framework for LOLBins Exploitation Used by China-aligned Threat Groups - Sun, 25 Jan 2026 19:00 - Source: Trend Micro Research, News and Perspectives
-
Embracing Choice in Cybersecurity: TrendAI Vision One™ and SentinelOne Integration - Sun, 25 Jan 2026 19:00 - Source: Trend Micro Research, News and Perspectives
-
Pwn2Own: Researchers Earn $1 Million for 76 Zero-Days - Sun, 25 Jan 2026 19:00 - Source: Trend Micro Research, News and Perspectives
-
Watering Hole Attack Targets EmEditor Users with Information-Stealing Malware - Wed, 21 Jan 2026 19:00 - Source: Trend Micro Research, News and Perspectives
-
LABScon25 Replay | How to Bug Hotel Rooms v2.0 - Wed, 21 Jan 2026 09:00 - Source: SentinelLabs - We are hunters, reversers, exploit developers, and tinkerers shedding light on the world of malware, exploits, APTs, and cybercrime across all platforms.
-
LLMs in the SOC (Part 1) | Why Benchmarks Fail Security Operations Teams - Tue, 20 Jan 2026 09:00 - Source: SentinelLabs - We are hunters, reversers, exploit developers, and tinkerers shedding light on the world of malware, exploits, APTs, and cybercrime across all platforms.
-
From Extension to Infection: An In-Depth Analysis of the Evelyn Stealer Campaign Targeting Software Developers - Sun, 18 Jan 2026 19:00 - Source: Trend Micro Research, News and Perspectives
-
Your 100 Billion Parameter Behemoth is a Liability - Thu, 15 Jan 2026 19:00 - Source: Trend Micro Research, News and Perspectives
-
Introducing ÆSIR: Finding Zero-Day Vulnerabilities at the Speed of AI - Wed, 14 Jan 2026 19:00 - Source: Trend Micro Research, News and Perspectives
-
LABScon25 Replay | Hacktivism and War: A Clarifying Discussion - Wed, 14 Jan 2026 09:00 - Source: SentinelLabs - We are hunters, reversers, exploit developers, and tinkerers shedding light on the world of malware, exploits, APTs, and cybercrime across all platforms.
-
Inside the LLM | Understanding AI & the Mechanics of Modern Attacks - Tue, 13 Jan 2026 08:58 - Source: SentinelLabs - We are hunters, reversers, exploit developers, and tinkerers shedding light on the world of malware, exploits, APTs, and cybercrime across all platforms.
-
Key Insights on SHADOW-AETHER-015 and Earth Preta from the 2025 MITRE ATT&CK Evaluation with TrendAI Vision One™ - Mon, 12 Jan 2026 19:00 - Source: Trend Micro Research, News and Perspectives
-
Analyzing a Multi-Stage AsyncRAT Campaign via Managed Detection and Response - Sun, 11 Jan 2026 19:00 - Source: Trend Micro Research, News and Perspectives
-
Get Executives on board with managing Cyber Risk - Sun, 28 Dec 2025 19:00 - Source: Trend Micro Research, News and Perspectives
-
Trend Micro's Pivotal Role in INTERPOL's Operation Sentinel: Dismantling Digital Extortion Networks Across Africa - Sun, 28 Dec 2025 19:00 - Source: Trend Micro Research, News and Perspectives
-
What Does it Take to Manage Cloud Risk? - Sun, 21 Dec 2025 19:00 - Source: Trend Micro Research, News and Perspectives
-
What Cyber Defenders Really Think About AI Risk - Wed, 17 Dec 2025 19:00 - Source: Trend Micro Research, News and Perspectives
-
LLMs & Ransomware | An Operational Accelerator, Not a Revolution - Mon, 15 Dec 2025 09:00 - Source: SentinelLabs - We are hunters, reversers, exploit developers, and tinkerers shedding light on the world of malware, exploits, APTs, and cybercrime across all platforms.
-
Cyber Risk Management: Defenders Tell It Like It Is - Sun, 14 Dec 2025 19:00 - Source: Trend Micro Research, News and Perspectives
-
Enhancing Security Awareness with Cyber Risk Exposure Management - Sun, 14 Dec 2025 19:00 - Source: Trend Micro Research, News and Perspectives
-
SHADOW-VOID-042 Targets Multiple Industries with Void Rabisu-like Tactics - Wed, 10 Dec 2025 19:00 - Source: Trend Micro Research, News and Perspectives
-
Malicious Apprentice | How Two Hackers Went From Cisco Academy to Cisco CVEs - Wed, 10 Dec 2025 11:55 - Source: SentinelLabs - We are hunters, reversers, exploit developers, and tinkerers shedding light on the world of malware, exploits, APTs, and cybercrime across all platforms.
-
Trend Vision One™ Integration with AWS Security Hub CSPM: Unifying Cloud Security - Tue, 09 Dec 2025 19:00 - Source: Trend Micro Research, News and Perspectives
-
Trend Vision One™ Stacks Up Against Scattered Spider and Mustang Panda in 2025 MITRE ATT&CK® Evaluations - Tue, 09 Dec 2025 19:00 - Source: Trend Micro Research, News and Perspectives
-
CVE-2025-55182: React2Shell Analysis, Proof-of-Concept Chaos, and In-the-Wild Exploitation - Tue, 09 Dec 2025 19:00 - Source: Trend Micro Research, News and Perspectives
-
AI-Automated Threat Hunting Brings GhostPenguin Out of the Shadows - Sun, 07 Dec 2025 19:00 - Source: Trend Micro Research, News and Perspectives
-
Critical React Server Components Vulnerability CVE-2025-55182: What Security Teams Need to Know - Thu, 04 Dec 2025 19:00 - Source: Trend Micro Research, News and Perspectives
-
Project View: A New Era of Prioritized and Actionable Cloud Security - Wed, 03 Dec 2025 19:00 - Source: Trend Micro Research, News and Perspectives
-
PureRAT Campaign Targets Job Seekers, Abuses Foxit PDF Reader for DLL Side-loading - Tue, 02 Dec 2025 19:00 - Source: Trend Micro Research, News and Perspectives
-
Unraveling Water Saci's New Multi-Format, AI-Enhanced Attacks Propagated via WhatsApp - Mon, 01 Dec 2025 19:00 - Source: Trend Micro Research, News and Perspectives
-
Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like - Tue, 25 Nov 2025 20:00 - Source: Darknet – Hacking Tools, Hacker News & Cyber Security
-
SmbCrawler – SMB Share Discovery and Secret-Hunting - Sun, 23 Nov 2025 20:00 - Source: Darknet – Hacking Tools, Hacker News & Cyber Security
-
Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk - Thu, 20 Nov 2025 20:00 - Source: Darknet – Hacking Tools, Hacker News & Cyber Security
-
Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting - Tue, 18 Nov 2025 20:00 - Source: Darknet – Hacking Tools, Hacker News & Cyber Security
-
mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers - Sun, 16 Nov 2025 20:00 - Source: Darknet – Hacking Tools, Hacker News & Cyber Security
-
Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events - Tue, 11 Nov 2025 20:00 - Source: Darknet – Hacking Tools, Hacker News & Cyber Security
-
Reconnoitre – Open-Source Reconnaissance and Service Enumeration Tool - Sun, 09 Nov 2025 20:00 - Source: Darknet – Hacking Tools, Hacker News & Cyber Security