NullMixer: multiple malware in one
We explain how the NullMixer dropper can download numerous Trojans onto a device.
769 articles
We explain how the NullMixer dropper can download numerous Trojans onto a device.
We explain how the Harly Trojan subscriber targets Android users.
The RedLine Trojan stealer spreads under the guise of cheats for popular games and posts videos on victims’ YouTube channels with a link to itself in the description.
It’s time to update! Microsoft patches 64 vulnerabilities in a variety of products and components — from Windows and Office to Defender and Azure.
Using the most common families of malicious extensions as an example, we explain what can go wrong after installing a browser plug-in.
We recall the story of the ILOVEYOU worm — one of the most infamous viruses from 22 years ago.
New malicious campaign hunts for Discord tokens and credit card information via infected npm packages.
Our experts discovered a fresh version of CosmicStrand, a rootkit that hides from researchers in the UEFI firmware.
We review a major cryptocurrency theft using spyware inside a PDF.
The new Luna and Black Basta ransomware strains are capable of attacking Windows, Linux and VMware ESXi.
How scammers swindle users out of cryptocurrency through a fake Nvidia giveaway supposedly worth 50,000 BTC.
How scammers lure YouTube users to a fake website where a purported bug lets them exchange Bitcoin at an excellent rate.
How cybercriminals extract bank card details pretending to be DHL.
Malware can infect your router, slow down the internet connection and steal data. We explain how to protect your Wi-Fi.
Can a device be hacked when switched off? Recent studies suggest so. Let’s see how this is even possible.
Here’s how phishers extract phone numbers and credentials from users of Wise.
New vulnerability CVE-2022-30190, aka Follina, allows exploitation of Windows Support Diagnostic Tool via MS Office files.
Most third-party apps for connected cars require access to your account with the manufacturer. But are they secure?
We explain how scammers steal cryptowallets through phishing.
We explain how phishers are swindling Wells Fargo customers out of personal credentials, passwords, card details, and selfies with an ID card.