PDFSIDER malware exploits PDF24 App for backdoor access
Resecurity noted that its HUNTER team observed PDFSIDER being actively used by several ransomware groups to deliver payloads.
Resecurity noted that its HUNTER team observed PDFSIDER being actively used by several ransomware groups to deliver payloads.
Cisco has finally fixed a critical Cisco AsyncOS zero-day flaw exploited since November 2025.
In brief: Microsoft fixes a Windows zero-day flaw, Russian hackers target Ukraine posing as charities, and more.
RedVDS sold access to disposable virtual Windows servers for as little as $24 a month, allowing criminals to run fraud and phishing operations at scale.
The man is suspected of facilitating cybercrime by allowing malware devs to test whether their software could bypass antivirus protections.
The campaign mainly delivers commodity malware, including info-stealers such as AgentTesla, FormBook, and Lumma Stealer.
ZDI said that CVE-2026-20805 was likely used in targeted attacks as part of a larger exploit chain.
CERT-UA attributed the activity to a state-backed group known as Void Blizzard.
VoidLink is a cloud-focused implant written primarily in Zig with a flexible modular architecture.
Trellix researchers report that stolen Facebook accounts are used to spread scams, harvest personal data, and commit identity fraud.
Showing elements 181 - 190