China-linked attackers used Venezuela-themed phishing and DLL side-loading to deploy the LOTUSLITE backdoor against U.S.
Hackers are exploiting a side-loading flaw in a signed GitKraken executable to bypass defenses and deploy trojans, stealers, ...
Active malware exploits DLL side-loading in a signed GitKraken binary to deliver trojans, stealers, and remote access malware ...
CS2 DLL Injector is a specialized utility tool designed for Counter-Strike 2 to load custom libraries and modifications seamlessly. CS2 DLL Injector is a professional-grade utility application ...
A highly advanced “packer-as-a-service” known as Shanya, also referred to as VX Crypt, has become the preferred weapon for ransomware gangs seeking to evade security tools. According to a new research ...
Cybersecurity experts warn of a stealthy Microsoft patch addressing a long-exploited Windows LNK zero-day vulnerability, CVE-2025-9491, now mitigated in November 2025 updates. Threat actors, including ...
The Chinese cyberespionage hackers commonly tracked as Salt Typhoon haven't stopped their campaign against global telecoms, says managed threat detection firm Darktrace. The first said Monday it ...
A threat group aligned with China, known as UTA0388, has executed spear-phishing campaigns since April 2025 to deliver a Go-language implant called GOVERSHELL. The attacks targeted regions including ...
Editorial Note: Talk Android may contain affiliate links on some articles. If you make a purchase through these links, we will earn a commission at no extra cost to you. Learn more. Google just ...
Jaguar Land Rover suffers a major cyberattack. ICE gains access to a powerful spyware tool. Researchers find Fancy Bear snuffling around a new Outlook backdoor. Cloudflare and Palo Alto Networks ...
Security researchers have uncovered a new Microsoft Outlook backdoor developed by Russian threat actors that monitors incoming email for trigger words and can exfiltrate data, upload files and execute ...
Google researchers say China-linked UNC6384 combined social engineering, signed malware, and adversary-in-the-middle attacks to evade detection. A China-linked cyberespionage group has been hijacking ...