A new remote administration tool (RAT) weaponizing Microsoft Office and Adobe PDF documents to deliver malicious code was spotted in dark web forums and Telegram channels. The malware was discovered ...
The decades-old "finger" command is making a comeback,, with threat actors using the protocol to retrieve remote commands to ...
Cloud and computer security leader Netskope reports that phishing downloads have increased 450% over the past 12 months. Cybercriminals are getting creative and taking on more sophisticated approaches ...
Avast! Virus Lab has discovered a dirty trick that cybercriminals are using to encode malware exploits and payloads into PDF files. Adobe says that the this trick has been used in a relatively small ...
Microsoft Word also leveraged in the email campaign, which uses a 22-year-old Office RCE bug. While most malicious e-mail campaigns use Word documents to hide and spread malware, a recently discovered ...
New Mac Malware, Possibly From North Korea, Masquerades as PDF Viewer The attack arrives through a functioning PDF viewer app, according to security firm Jamf. The app can then become malicious when ...
Google LLC’s TAG research team, which tracks state-backed hacking groups, has disrupted a malware campaign launched by a Russian threat actor. The search giant detailed the operation in a blog post ...
The "PDF Reader & File Manager" Android app from a developer called TSARKA Watchfaces and "QR Reader & File Manager" from a developer dubbed "Risovanul" are two examples of apps Zscaler found to ...
The Gozi Trojan, a bot that fronted a sophisticated hacking subscription service earlier last year, was found again in the wild today infecting PCs at a healthy clip through the use of PDF spam. But, ...
Software supply chain management firm Sonatype Inc. today said it found a sharp rise in malicious activity targeting software developers and supply chains in the second quarter. The company’s Q2 2025 ...