The Chinese state-sponsored cyber threat is known for moving fast and trying odd attack vectors; now it's branching out in ...
UNC6692 has been attributed to a large email campaign that's designed to overwhelm a target's inbox with a flood of spam ...
North Korean hackers developed a new macOS malware kit, but were disrupted by a security researcher who exploited ...
Used in attacks against energy and utilities organizations, Lotus Wiper can overwrite drivers, delete files, and cripple ...
A new LOTUSLITE malware campaign is targeting India’s banking sector using phishing files and trusted tools. Researchers say ...
Updated LOTUSLITE targets India banking sector via CHM and DLL side-loading, expanding espionage campaign to South Korea and ...
A legitimate Intel storage utility has been repurposed in a highly targeted malware campaign that uses a little-known. NET mechanism to run hostile code inside a signed executable, giving attackers a ...
Two phishing campaigns, each using a different stealthy infection technique, are targeting organizations in attacks which aim ...
A convincing impersonation of TidBITS contributor Glenn Fleishman on our public Slack group fooled an experienced IT ...
The Payouts King ransomware is using the QEMU emulator as a reverse SSH backdoor to run hidden virtual machines on ...