LeakNet uses ClickFix via compromised sites to gain access, enabling stealth attacks and scalable ransomware operations.
LeakNet ransomware uses ClickFix attacks on hacked sites to trick users into running malicious commands and stealing data.
New ClickFix variant maps WebDAV drive to run trojanized WorkFlowy app, enabling stealth C2 beacon and payload delivery.
A new malware strain dubbed Slopoly, likely created using generative AI tools, allowed a threat actor to remain on a compromised server for more than a week and steal data in an Interlock ransomware ...
IntroductionThreat actors often take advantage of major global events to fuel interest in their malicious activities. Zscaler ThreatLabz is diligently tracking a surge in cybercriminal activity that ...
An N-day vulnerability in Microsoft Word exposes nearly 14 million assets. Attackers can exploit this flaw to bypass security prompts, enabling deployment of malware and establishing persistent access ...
A compromised Chrome extension with 7,000 users was updated to deploy malware, strip security headers, and steal cryptocurrency wallet seed phrases.
A new ClickFix attack variant uses fake CAPTCHA pages instructing victims to paste and execute malicious commands in Windows Terminal.
Cybercriminals are now able to rent Malware-as-a-service and legally install malware on your PC. Learn how to identify these ...
Malicious JavaScript code delivered by the AppsFlyer Web SDK hijacked cryptocurrency, potentially in a supply-chain attack.
There is no shortage of Windows customization tools, but this one stands out by giving you maximum control with the right methods.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results