Discover the types of malware in 2025, from backdoors to ransomware, and learn which families hackers use most in real-world attacks.
Criminals tend to target casual gamers looking for new games or streamers who are eager to showcase something fresh ...
Hackers use fake Google search results to trick users into downloading lookalike apps laced with malware that have been ...
A new Android banking and remote access trojan (RAT) dubbed Klopatra disguised as an IPTV and VPN app has infected more than ...
Cybersecurity researchers have disclosed details of a new malware family dubbed YiBackdoor that has been found to share ...
Microsoft warns that MacOS malware XCSSET has undergone another major evolution since earlier this year, bringing key changes ...
When investigating, Google's Mandiant team found the malware BRICKSTORM on Linux and BSD-based appliances from multiple ...
CISA releases detailed analysis of malware exploiting Ivanti EPMM vulnerabilities CVE-2025-4427 and CVE-2025-4428, providing ...
Cybercriminals are constantly abusing the trust small and medium-sized businesses (SMB) have in certain tools to try and ...
PlugX is a modular remote access trojan (RAT) widely used by many China-aligned hacking groups, but most prominently by ...
The group 'Scattered LAPSUS$ Hunters' says it will dump a trove of information allegedly stolen from Salesforce customers ...
The person who posted expressed embarrassment about falling for the scam and didn’t know how to recover from the experience.