A multi-stage malware loader known as OysterLoader has continued to evolve into early 2026, refining its command-and-control (C2) infrastructure and obfuscation methods. The C++-based threat, also ...
Hackers are impersonating IT staff in Microsoft Teams to trick employees into installing malware, giving attackers stealthy access to corporate networks.
Since last fall, well-known backdoor malware SmokeLoader has been upgraded with a new second-stage payload dropper called CoffeeLoader that's tricked out with techniques to beat endpoint security ...
Threat analysts have discovered a new obfuscation technique used by the Hive ransomware gang, which involves IPv4 addresses and a series of conversions that eventually lead to downloading a Cobalt ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results