Virtual Hard Disks masquerading as PDF files are allowing hackers to sneak remote-access software through enterprise defenses.
Right then, let’s have a look at computer security threats. It’s a bit of a minefield out there, isn’t it? With everything moving online, from our banking to keeping in touch with mates, it’s easy to ...
A complex phishing campaign uses decentralized fake PDFs that mount virtual drives to silently install the AsyncRAT malware.
Discover how cyber insurance safeguards your business against cyberattacks by covering data loss recovery, legal expenses, and more. Get clear insights on coverage.
If you have recently received an email asking you to download your e-PAN card, be extremely careful. Such emails may be part of a growing online scam. The government or the Income Tax Department does ...
Security researchers uncover evidence that the Windows-based 'RenEngine loader' malware has infected around 30,000 users in ...
A malware-free phishing campaign targets corporate inboxes and asks employees to view "request orders," ultimately leading to ...
How AI and agentic AI are reshaping malware and malicious attacks, driving faster, stealthier, and more targeted ...
Two malware campaigns weaponize open-source software to target executives and cloud systems, combining social engineering ...
Ransomware operators are hosting and delivering malicious payloads at scale by abusing virtual machines (VMs) provisioned by ...
How modern infostealers target macOS systems, leverage Python‑based stealers, and abuse trusted platforms and utilities to ...
Ukraine's Computer Emergency Response Team (CERT) says that Russian hackers are exploiting CVE-2026-21509, a recently patched vulnerability in multiple versions of Microsoft Office.