VolkLocker uses AES-256 in Galois/Counter Mode ( GCM) for encryption through Golang's "crypto/rand" package. Every encrypted ...
A custom loader initiated the vulnerable driver, located targeted endpoint detection services then issued kernel-level ...
React2Shell vulnerability CVE-2025-55182 is actively exploited to deploy Linux malware, run commands, and steal cloud ...
Tens of thousands of users have installed GhostPoster Firefox extensions, which rely on steganography to hide malware in ...
A new Android malware-as-a-service (MaaS) named Cellik is being advertised on underground cybercrime forums offering a robust ...
Security forces captured 160 FETÖ suspects in the past two weeks, as Türkiye marks on Wednesday the anniversary of the ...
Thinking a deleted file is truly gone is wishful thinking — but Windows’ sDelete tool can wipe it permanently and make it ...
A new malware-as-a-service (MaaS) information stealer named SantaStealer is being advertised on Telegram and hacker forums as ...
Cybercriminals are exploiting demand for pirated movies by disguising malware as a fake torrent of “One Battle After Another, ...
Bitdefender recently discovered a fraudulent torrent for the film One Battle After Another that contains an ingenious Trojan delivery mechanism. The security company claims its tools ...
The flaw, tracked as CVE-2025-9491, allowed cybercriminals to hide malicious commands from users inspecting files through ...