News

The product page for the Endgame Gear OP1w 4k v2 mouse was compromised for about two weeks to deliver Windows-based Xred malware.
"As an immediate response, we thoroughly checked all our hosted software and firmware files for malware, confirming no other ...
The Lumma Stealer is back after Microsoft and law enforcement took action to significantly disrupt the malware’s ...
The popular NPM package 'is' has been compromised in a supply chain attack that injected backdoor malware, giving attackers ...
Endgame Gear have apologised for unknowingly hosting malware-corrupted configuration software on their website, though claim ...
A new variant of the Coyote malware is exploiting a Windows feature, the UI Automation framework, to steal users' banking and ...
Coyote malware uses Windows UI Automation to target 75 banks and crypto sites in Brazil, risking credential theft.
Malware known as a "BadBox 2.0" has infiltrated over 10 million Android devices, including TV streaming devices, tablets, and ...
A new variant of the banking trojan 'Coyote' has begun abusing a Windows accessibility feature, Microsoft's UI Automation ...
Researchers have known for almost a decade that threat actors sometimes use DNS records to host malicious PowerShell scripts.
The use of GitHub gave the malware-as-a-service (MaaS) a reliable and easy-to-use platform that’s greenlit in many enterprise ...
Endgame Gear mouse configuration tool was infected with a nasty bit of malware going by reports - a remote access trojan by the name of Xred.