Researchers Uncover How Colibri Malware Stays Persistent on Hacked Systems
Cybersecurity researchers have detailed a “simple but efficient” persistence mechanism adopted by a relatively nascent malware loader …
Cybersecurity researchers have detailed a “simple but efficient” persistence mechanism adopted by a relatively nascent malware loader …
A China-based advanced persistent threat (APT) known as Mustang Panda has been linked to an ongoing cyberespionage campaign using a …
An advanced persistent threat (APT) group operating with objectives aligned with the Chinese government has been linked to an organized …
An advanced persistent threat (APT) hacking group operating with motives that likely align with Palestine has embarked on a new campaign …
A Chinese advanced persistent threat (APT) group has been targeting Taiwanese financial institutions as part of a “persistent campaign” …
A new advanced persistent threat (APT) has been behind a string of attacks against hotels across the world, along with governments, …
A malicious campaign that has set its sights on industrial-related entities in the Middle East since 2019 has resurfaced with an upgraded …
The China-based APT known as CactusPete has returned with a new campaign aimed at military and financial targets in Eastern Europe, which …
Last week on Malwarebytes Labs, our Lock and Code podcast delved into Bluetooth and beacon technology. We also dug into APT groups …
Western intelligence agencies say they’ve found evidence that Russian cyber espionage is targeting efforts to develop a coronavirus …
Yesterday, on the 3rd anniversary of the infamous global WannaCry ransomware outbreak for which North Korea was blamed, the U.S. government …
More than 150,000 emails spreading the Hupigon RAT that use adult dating as a lure have been uncovered, with almost half being sent to U.S. …
The coronavirus (Covid-19) has become a global pandemic and this is a golden time for attackers to take advantage of this fear to increase …
Over 80 percent of exposed Exchange servers are still vulnerable to a severe vulnerability – nearly two months after the flaw was …