New Malware Targets 97 Browser Variants, 76 Crypto Wallets & 19 Password Managers Your email has been sent Learn how the Meduza Stealer malware works, what it targets and how to protect your company ...
The Arkanix Stealer malware can collect and exfiltrate system information, browser data, VPN information, and arbitrary files ...
CTM360 reports 4,000+ malicious Google Groups and 3,500+ Google-hosted URLs used to spread the Lumma Stealer infostealing malware and a trojanized "Ninja Browser." The report details how attackers ...
Security researchers have discovered a new malware for macOS, which can be used to attack over 100 browser extensions that may be installed on the target Mac. Apple tries hard to make macOS and its ...
Browser extensions promise convenience. Many offer simple tools like new tab pages, translators or video helpers. Researchers, however, uncovered a long-running malware operation that abused that ...
Our malware articles typically concern either Android or Windows, but Apple users occasionally have to deal with malicious software of their own. For instance, the Moonlock Lab cybersecurity team ...
Cybercriminals are disguising malware as phony browser updates on compromised websites. Fraudulent updates for Chrome, Firefox and Edge browsers are luring unsuspecting users into downloading malware ...
A new 'FakeUpdate' campaign targeting users in France leverages compromised websites to show fake browser and application updates that spread a new version of the WarmCookie backdoor. FakeUpdate is a ...
We all know that we shouldn’t click on suspicious links or download files from shady sources because they might contain malware. However, there’s a far more dangerous threat that most people ignore: ...
Kaspersky has identifiedmalware that takes a novel approach to intercepting both Chrome and Firefox browsers' encrypted traffic. They have identified targets of the malware to be in Russia and Belarus ...
Cybersecurity researchers from Proofpoint have identified a rising trend in threat activity that employs fake browser updates to disseminate malware. At least four distinct threat clusters have been ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results