Detection
- APPLICATIONS
CoffeeLoader Uses GPU-Based Armoury Packer to Evade EDR and Antivirus Detection
î ‚Mar 28, 2025î „Ravie LakshmananEndpoint Security / Threat Intelligence Cybersecurity researchers are calling attention to a new sophisticated malware called CoffeeLoader…
Read More » - APPLICATIONS
5 Identity Threat Detection & Response Must-Haves for Super SaaS Security
î ‚Mar 19, 2025î „The Hacker NewsSaaS Security / Threat Detection Identity-based attacks are on the rise. Attackers are targeting identities with…
Read More » - APPLICATIONS
OBSCURE#BAT Malware Uses Fake CAPTCHA Pages to Deploy Rootkit r77 and Evade Detection
î ‚Mar 14, 2025î „Ravie LakshmananThreat Intelligence / Malware A new malware campaign has been observed leveraging social engineering tactics to deliver…
Read More » - APPLICATIONS
Google Rolls Out AI Scam Detection for Android to Combat Conversational Fraud
î ‚Mar 05, 2025î „Ravie LakshmananMobile Security / Artificial Intelligence Google has announced the rollout of artificial intelligence (AI)-powered scam detection features…
Read More » - SMARTPHONES
Google’s new feature drop brings killer features including scam detection and loss of pulse
What you need to know Google’s March feature drop is here, bringing scam detection alerts for texts and calls to…
Read More » - REVIEWS
Google will finally fix awesome (but broken) song detection feature for Pixels
Google’s Pixel phones include numerous thoughtful features you don’t get on other phones, like Now Playing. This feature can identify…
Read More » - SMARTPHONES
Pixel phones are close to getting real-time scam detection for calls and texts
C. Scott Brown / Android Authority TL;DR Google says Scam Detection for calls and messages will arrive on Pixel phones…
Read More » - APPLICATIONS
New Snake Keylogger Variant Leverages AutoIt Scripting to Evade Detection
î ‚Feb 19, 2025î „The Hacker NewsMalware / Threat Intelligence A new variant of the Snake Keylogger malware is being used to…
Read More » - APPLICATIONS
Chinese Hackers Exploit MAVInject.exe to Evade Detection in Targeted Cyber Attacks
î ‚Feb 18, 2025î „Ravie LakshmananCyber Espionage / Malware The Chinese state-sponsored threat actor known as Mustang Panda has been observed employing…
Read More » - APPLICATIONS
Malicious ML Models on Hugging Face Leverage Broken Pickle Format to Evade Detection
î ‚Feb 08, 2025î „Ravie LakshmananArtificial Intelligence / Supply Chain Security Cybersecurity researchers have uncovered two malicious machine learning (ML) models on…
Read More »