A new WhatsApp Web attack spreads self-propagating ZIP files containing Astaroth banking malware through trusted ...
LONDON, Jan. 5, 2026 /PRNewswire/ -- 2025 saw a surge in AI-enabled cyberthreats as adversaries weaponised generative models to produce polymorphic malware, insider-style phishing, and increasingly ...
CISA and the NSA warn that Chinese state-sponsored attackers are deploying malware dubbed BRICKSTORM on VMware servers to perform lateral movement inside victim networks. Chinese state-sponsored ...
Facepalm: SmartTube is a popular alternative media player for watching YouTube and other streaming sources on Android TV, usually with the benefit of removing ads. Unfortunately, the open-source app ...
A new Android malware family, promoted as a Malware-as-a-Service (MaaS), has surfaced on Russian-speaking cybercrime forums, offering full device takeover and real-time fraud capabilities. Known as ...
Google on Wednesday revealed five recent malware samples that were built using generative AI. The end results of each one were far below par with professional malware development, a finding that shows ...
Global cybercrime costs are expected to grow by 15 percent per year over the next five years—with malware and ransomware driving a significant portion. Malware has been part of the cybersecurity story ...
A new Android banking Trojan called Herodotus mimics human behavior, such as random keystroke delays, to evade detection tools. The malware employs device-takeover tactics, including the abuse of ...
Threat actors are conducting a new malicious campaign deploying the Stealit malware via disguised applications, according to Fortinet. The cybersecurity provider’s threat research lab, FortiGuard Labs ...
Cybersecurity researchers revealed an active malware campaign called Stealit that exploits Node.js’ Single Executable Application (SEA) feature for distributing malicious payloads. The campaign uses ...
Sherrod DeGrippo: Welcome to the Microsoft Threat Intelligence Podcast. I'm Sherrod DeGrippo. Ever wanted to step into the shadowy realm of digital espionage, cybercrime, social engineering, fraud?