Evade
- APPLICATIONS
CoffeeLoader Uses GPU-Based Armoury Packer to Evade EDR and Antivirus Detection
Mar 28, 2025Ravie LakshmananEndpoint Security / Threat Intelligence Cybersecurity researchers are calling attention to a new sophisticated malware called CoffeeLoader…
Read More » - APPLICATIONS
Cybercriminals Exploit CSS to Evade Spam Filters and Track Email Users’ Actions
Mar 17, 2025Ravie LakshmananWeb Security / Cyber Threat Malicious actors are exploiting Cascading Style Sheets (CSS), which are used to…
Read More » - APPLICATIONS
OBSCURE#BAT Malware Uses Fake CAPTCHA Pages to Deploy Rootkit r77 and Evade Detection
Mar 14, 2025Ravie LakshmananThreat Intelligence / Malware A new malware campaign has been observed leveraging social engineering tactics to deliver…
Read More » - APPLICATIONS
New Snake Keylogger Variant Leverages AutoIt Scripting to Evade Detection
Feb 19, 2025The Hacker NewsMalware / Threat Intelligence A new variant of the Snake Keylogger malware is being used to…
Read More » - APPLICATIONS
Chinese Hackers Exploit MAVInject.exe to Evade Detection in Targeted Cyber Attacks
Feb 18, 2025Ravie LakshmananCyber Espionage / Malware The Chinese state-sponsored threat actor known as Mustang Panda has been observed employing…
Read More » - APPLICATIONS
Malicious ML Models on Hugging Face Leverage Broken Pickle Format to Evade Detection
Feb 08, 2025Ravie LakshmananArtificial Intelligence / Supply Chain Security Cybersecurity researchers have uncovered two malicious machine learning (ML) models on…
Read More » - APPLICATIONS
WordPress Skimmers Evade Detection by Injecting Themselves into Database Tables
Cybersecurity researchers are warning of a new stealthy credit card skimmer campaign that targets WordPress e-commerce checkout pages by inserting…
Read More » - APPLICATIONS
Neglected Domains Used in Malspam to Evade SPF and DMARC Security Protections
Cybersecurity researchers have found that bad actors are continuing to have success by spoofing sender email addresses as part of…
Read More » - APPLICATIONS
Hackers Exploit Webview2 to Deploy CoinLurker Malware and Evade Security Detection
Bogus software update lures are being used by threat actors to deliver a new stealer malware called CoinLurker. “Written in…
Read More » - APPLICATIONS
New Linux Rootkit PUMAKIT Uses Advanced Stealth Techniques to Evade Detection
Dec 13, 2024Ravie LakshmananLinux / Threat Analysis Cybersecurity researchers have uncovered a new Linux rootkit called PUMAKIT that comes with…
Read More »