Android Ad Fraud Hits 659M Daily Bid Requests
Android users were unwittingly ensnared by Trapdoor, a massive ad fraud scheme. This operation masqueraded as utility apps, spiraling into millions of fraudulent ad requests daily.
In-depth coverage of the latest Ransomware & Malware developments, trends, and analysis — curated daily.
Android users were unwittingly ensnared by Trapdoor, a massive ad fraud scheme. This operation masqueraded as utility apps, spiraling into millions of fraudulent ad requests daily.
Imagine paying a thief only to find they've smashed your valuables beyond repair. That's the terrifying reality of VECT 2.0, a ransomware that acts like a digital sledgehammer, crushing data instead of locking it.
That quiet period where your systems haven't been touched? It might be the most dangerous time for your organization. We've seen this horror movie before, and the ending is rarely happy.
Authorities have snagged a key player behind the KimWolf botnet, a massive operation that compromised almost 2 million devices worldwide. The arrest highlights the growing international crackdown on cybercrime-as-a-service.
The alleged architect of the gargantuan Kimwolf botnet, responsible for record-breaking DDoS attacks and targeting critical infrastructure, has been apprehended. This takedown signals a significant win for international cybercrime law enforcement.
Forget your shiny new zero-days. The real threat lurks in modular backdoors. Showboat, a Linux framework, is making waves. And it's not for a good reason.
A massive online storefront's customer base was laid bare, with 28,000 accounts compromised by a sophisticated infostealer operation. Ukrainian authorities are pointing the finger at a young suspect from Odesa.
Cybercriminals are getting slicker. Microsoft just busted Fox Tempest, a service that made malware look like the real deal.
The sophisticated 'TamperedChef' malware, disguised as legitimate productivity software, is evolving with alarming speed. New research reveals how attackers are exploiting code reuse and certificate manipulation to stay one step ahead of defenders.
A significant operation enabling cybercriminals to digitally sign malware as if it were legitimate software has been dismantled. This attack vector highlights how even trusted cloud services can be subverted, impacting user trust and system security.
Android users were unwittingly ensnared by Trapdoor, a massive ad fraud scheme. This operation masqueraded as utility apps, spiraling into millions of fraudulent ad requests daily.
A leaked malware strain is now fueling a fresh wave of attacks against the Node Package Manager. Developers' secrets and systems are increasingly at risk.
The open-source code for malware is becoming a dangerous playground for attackers. Researchers just found four new npm packages peddling everything from data-stealing worms to potent DDoS bots.
The Gentlemen, a prolific ransomware-as-a-service operation, has been compromised. A leaked internal database offers an unprecedented, unvarnished glimpse into its inner workings, revealing operational tactics and key actors.
The malware game is stale. Or so you thought. This aging botnet, a relic from 2018, just dropped a new flavor of its attack.