Angry Stealer Malware
The malware scene has a new entity on the block: Angry Stealer, a rebrand of Rage Stealer. This isn’t just a malware upgrade; it’s a … Read more
The malware scene has a new entity on the block: Angry Stealer, a rebrand of Rage Stealer. This isn’t just a malware upgrade; it’s a … Read more
Microsoft Patches Zero-Day Vulnerability Microsoft has addressed 60 security flaws in its latest patch release, including an actively exploited zero-day vulnerability in Windows. This critical … Read more
A new and improved version of the infamous BunnyLoader malware has hit the scene, shaking up the cyber world with its advanced tricks and posing … Read more
In a concerning development for cybersecurity, the threat group known as Blind Eagle, also identified as APT-C-36, has intensified its malicious activities. This financially driven … Read more
Chaos builder The MalwareHunterTeam has discovered a new ransomware sample built with the Chaos builder. The malware, called WannaFriendMe, is remarkable because it offers to … Read more
Google is slowly introducing a new “Data Safety” section to its Android app store, the Play Store. In this section, software developers should list what … Read more
Experts have stumbled upon yet another piece of malware that has joined the ranks of dangerous info-stealers. Named Prynt Stealer, the malware provides operators with … Read more
A new message about the hack has appeared on the Stormous Ransomware Telegram channel – an ambitious group claims to have hacked Coca-Cola servers and … Read more
Microsoft has released the final test version of the cumulative update KB5012636 for Windows 10 1809 and Windows Server 2019 operating systems. The developers tried … Read more
Emotet bot growers continue to increase their combat potential through malicious mailings. In February, Kaspersky Lab’s security solutions blocked about 3,000 spam emails generated by … Read more
Cybercriminals persuade unsuspecting users to install a fake upgrade to Windows 11, which in fact, copies malware into the system that steals data from the … Read more