Malware Analysis

MacSync Stealer Evolves to Evade Apple Security Checks

Analytics Intelligence

MacSync Stealer Evolves to Evade Apple Security Checks

The perception of macOS as a secure, walled garden impenetrable to the malware plaguing other operating systems is being systematically dismantled by increasingly sophisticated threats. A newly identified variant of the MacSync Stealer, discovered by

Analytics Intelligence When Does a Monitoring Tool Become a Threat?

In the intricate ecosystem of enterprise IT, system administrators rely on a host of specialized tools to maintain operational health and performance, placing implicit trust in the software designed to be their digital ally. A sophisticated campaign recently uncovered by researchers at Ontinue’s C

When Does a Monitoring Tool Become a Threat?
Analytics Intelligence A Perfect 10 Flaw in HPE OneView Threatens Data Centers

A deeply critical vulnerability within Hewlett Packard Enterprise OneView management software has emerged as a paramount threat to enterprise data centers, enabling unauthenticated remote code execution and earning the highest possible Common Vulnerability Scoring System (CVSS) score of 10.0. This

A Perfect 10 Flaw in HPE OneView Threatens Data Centers
Security Hackers Turn Nezha Monitoring Tool Into a Stealthy RAT

A detailed cybersecurity analysis has illuminated a troubling new frontier in cyber warfare, where the very tools designed to maintain system health and security are being systematically turned into weapons by malicious actors. In a stark illustration of this trend, threat actors are now

Hackers Turn Nezha Monitoring Tool Into a Stealthy RAT
Hackers & Threats Can Your Security Stop AI-Powered Phishing Attacks?

The familiar red flags of phishing emails—the misspelllings, the awkward grammar—are rapidly becoming relics of a bygone era, replaced by flawlessly crafted, AI-generated lures that can deceive even the most cautious users. This fundamental shift marks a critical escalation in the cybersecurity arm

Can Your Security Stop AI-Powered Phishing Attacks?
Hackers & Threats Lazarus Group Evolves BeaverTail Malware for Financial Theft

A highly sophisticated cyber campaign is leveraging trust in everyday professional tools to deploy an advanced malware variant, signaling a dangerous escalation in tactics by the notorious Lazarus Group. This state-sponsored hacking collective, long associated with North Korea, has refined its

Lazarus Group Evolves BeaverTail Malware for Financial Theft
Hackers & Threats Kimwolf Botnet Infects 1.8 Million Android TV Boxes

A previously unknown malware campaign has silently compromised an estimated 1.8 million Android TV boxes across the globe, creating a colossal botnet that only revealed its immense scale when one of its control domains briefly became the most queried domain online, even surpassing industry giants

Kimwolf Botnet Infects 1.8 Million Android TV Boxes
Loading
subscription-bg
Subscribe to Our Weekly News Digest

Stay up-to-date with the latest security news delivered weekly to your inbox.

Invalid Email Address
subscription-bg
Subscribe to Our Weekly News Digest

Stay up-to-date with the latest security news delivered weekly to your inbox.

Invalid Email Address