Cybercriminals
- REVIEWS
Cybercriminals turn to “residential proxy” services to hide malicious traffic
For years, gray market services known as “bulletproof” hosts have been a key tool for cybercriminals looking to anonymously maintain…
Read More » - APPLICATIONS
Cybercriminals Target AI Users with Malware-Loaded Installers Posing as Popular Tools
Fake installers for popular artificial intelligence (AI) tools like OpenAI ChatGPT and InVideo AI are being used as lures to…
Read More » - APPLICATIONS
Cybercriminals Clone Antivirus Site to Spread Venom RAT and Steal Crypto Wallets
May 27, 2025Ravie LakshmananMalware / Cybersecurity Cybersecurity researchers have disclosed a new malicious campaign that uses a fake website advertising…
Read More » - APPLICATIONS
Cybercriminals Exploit CSS to Evade Spam Filters and Track Email Users’ Actions
Mar 17, 2025Ravie LakshmananWeb Security / Cyber Threat Malicious actors are exploiting Cascading Style Sheets (CSS), which are used to…
Read More » - APPLICATIONS
Microsoft Exposes LLMjacking Cybercriminals Behind Azure AI Abuse Scheme
Feb 28, 2025Ravie LakshmananAPI Security / AI Security Microsoft on Thursday unmasked four of the individuals that it said were…
Read More » - APPLICATIONS
Cybercriminals Can Now Clone Any Brand’s Site in Minutes Using Darcula PhaaS v3
Feb 21, 2025Ravie LakshmananDark Web / Cybercrime The threat actors behind the Darcula phishing-as-a-service (PhaaS) platform appear to be readying…
Read More » - APPLICATIONS
Cybercriminals Use Eclipse Jarsigner to Deploy XLoader Malware via ZIP Archives
Feb 20, 2025Ravie LakshmananCybercrime / Malware A malware campaign distributing the XLoader malware has been observed using the DLL side-loading…
Read More »