QBot malware abuses Windows WordPad EXE to infect devices
Once the DLL is loaded, the malware uses C:\Windows\system32\curl.exe to download a DLL camouflaged as a PNG file from a remote host
Read More...Once the DLL is loaded, the malware uses C:\Windows\system32\curl.exe to download a DLL camouflaged as a PNG file from a remote host
Read More...The volume of malicious users and malicious projects being created on the index in the past week has outpaced our ability to respond in a timely fashion
Read More...Researchers identified an ongoing BatLoader campaign relying on Google Search Ads to deliver rogue web pages for ChatGPT and Midjourney
Read More...The cases discovered demonstrate that threat actors are now actively attempting to infect Windows developers with malicious submissions
Read More...Advertised as an info stealer with extensive capabilities and low antivirus detection
Read More...These attack variations begin with an initial vector that leverages a clean application that sideloads a second-stage payload which in turn, sideloads a malicious malware loader DLL
Read More...Users may be manipulated into downloading and executing the malware under the guise of legitimate software
Read More...Considering that the trojanized software is targeting corporate users, infected devices make candidates for the beginning of ransomware attacks
Read More...Threat actors behind the LockBit ransomware operation have developed new artifacts that encrypt files on devices running Apple's macOS operating system
Read More...Qbot's use of a new email distribution method was detected — PDF attachments that download Windows Script Files to install Qbot on victims' devices
Read More...