Malware & Threats

Spyware Founder Pleads Guilty in Landmark Federal Case
Malware & Threats Spyware Founder Pleads Guilty in Landmark Federal Case

The clandestine world of digital surveillance software, often cloaked in the guise of legitimate security tools, has been dealt a significant blow with the recent guilty plea of a prominent spyware creator in a rare and impactful federal prosecution. Bryan Fleming, the operator behind the notorious

What Makes the New Fog Ransomware So Dangerous?
Malware & Threats What Makes the New Fog Ransomware So Dangerous?

A highly focused and financially motivated ransomware campaign has been systematically targeting organizations across the United States, demonstrating a rapid and destructive operational model that prioritizes speed over subtlety. First identified in early May 2024, the threat, known as Fog

Fake WinRAR Sites Deliver Sophisticated Winzipper Trojan
Malware & Threats Fake WinRAR Sites Deliver Sophisticated Winzipper Trojan

The immense popularity of everyday software utilities creates a landscape of trust that cybercriminals are increasingly adept at exploiting through highly convincing fraudulent websites and sophisticated malware. A newly uncovered campaign is leveraging the trusted name of the WinRAR file archiver

Trend Micro Patches Critical RCE Flaw in Apex Central
Malware & Threats Trend Micro Patches Critical RCE Flaw in Apex Central

Introduction The very tools designed to protect a network's integrity can sometimes become the most significant points of failure, creating unforeseen pathways for malicious actors to exploit. In a recent development, Trend Micro has moved to address such a risk by releasing crucial security

Who Is China's Newest Cyberespionage Broker?
Malware & Threats Who Is China's Newest Cyberespionage Broker?

The global stage of cyber warfare is increasingly defined by specialization, where state-sponsored threat actors are no longer monolithic entities but part of a complex, collaborative ecosystem. A newly identified China-nexus threat actor, tracked as UAT-7290, exemplifies this evolution by

Is Your Coolify Server Vulnerable to Complete Takeover?
Malware & Threats Is Your Coolify Server Vulnerable to Complete Takeover?

A recent and comprehensive security disclosure has cast a harsh spotlight on the inherent risks of self-hosted infrastructure, revealing that the popular open-source platform Coolify contains a staggering 11 critical vulnerabilities that could allow attackers to achieve a full compromise of the

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later