https://arxiv.org/abs/1702.08719
[1702.08719] Malware Guard Extension: Using SGX to Conceal Cache Attacks
Abstract page for arXiv paper 1702.08719: Malware Guard Extension: Using SGX to Conceal Cache Attacks
extension usingmalwareguard
Sponsored https://www.blackedraw.com/
BLACKED RAW: Unfiltered Encounters with Powerful Men in 4K
https://thehackernews.com/2022/05/interpol-nabs-3-nigerian-scammers.html
Interpol Nabs 3 Nigerian Scammers Behind Malware-based Attacks
Interpol Nabs 3 Nigerian Scammers Behind Malware-based Attacks
malware based attacksinterpol
https://gbhackers.com/hackers-deploy-usb-malware/
Hackers Deploy USB Malware, RATs, and Stealers in Southeast Asian Government Attacks
Mar 27, 2026 - A multi-cluster cyberespionage operation in which attackers used USB-propagated malware, multiple RATs, loaders, and a custom stealer to target a Southeast...
southeast asianhackersdeploy
https://citizenlab.ca/2015/03/tibetan-uprising-day-malware-attacks/
Tibetan Uprising Day Malware Attacks - The Citizen Lab
Sep 1, 2020 - The Tibetan community is being targeted by email-based malware attacks that leverage the March 10 Tibetan Uprising anniversary as a theme.
malware attackscitizen labday
https://www.cybersecuritydive.com/news/infostealer-malware-surge-dark-web-mfa-fatigue-attacks/637977/
Infostealer malware surges on dark web amid rise in MFA fatigue attacks | Cybersecurity Dive
Lapsus$, one of the most prolific ransomware actors of 2022, has utilized such tactics to breach a number of high-profile organizations.
infostealer malwaredark web
https://www.statista.com/statistics/873097/malware-attacks-per-year-worldwide/?__sso_cookie_checker=failed
Number of malware attacks per year 2023| Statista
Feb 2, 2026 - During 2022, the worldwide number of malware attacks reached 5.5 billion, an increase of two percent compared to the preceding year.
malware attacksper yearnumber
https://www.trendmicro.com/en_us/research/24/i/earth-preta-new-malware-and-strategies.html
Earth Preta Evolves its Attacks with New Malware and Strategies | Trend Micro (US)
earth pretaevolvesattacksnew
https://www.infoworld.com/article/4149285/new-stoatwaffle-malware-auto%e2%80%91executes-attacks-on-developers-2.html
New ‘StoatWaffle’ malware auto‑executes attacks on developers | InfoWorld
Mar 24, 2026 - The newly observed malware abuses VS Code’s “runOn:folderOpen” feature to execute automatically from trusted projects, enabling near-frictionless compromise.
developers infoworldnew
https://securityaffairs.com/184941/apt/badaudio-malware-how-apt24-scaled-its-cyberespionage-through-supply-chain-attacks.html
BadAudio malware: How APT24 scaled its cyberespionage through supply chain attacks
Nov 22, 2025 - APT24 used supply chain attacks and varied techniques to deploy the BadAudio malware in a long-running cyberespionage campaign.
supply chainmalwarescaled
Sponsored https://www.flirt4free.com/
Free Live Sex Cams and Adult Chat | Flirt4Free
https://www.dashlane.com/blog/paris-security-meetup-at-dashlane
Dashlane Security Meetup: Malware and House Intercom Attacks
Last Thursday, we hosted the Paris Security Meetup in the Dashlane Office in Paris for two talks on malware and house intercom attacks.
dashlane securitymeetuphouse
https://www.kiteworks.com/risk-compliance-glossary/malware-based-attacks/
Malware-based Attacks
Jul 16, 2025 - Malware-based attacks pose a constant threat to software that can cause extensive damage and disruption, including content exposure. Protecting against them...
malware based attacks
https://citizenlab.ca/2014/12/malware-attack-targeting-syrian-isis-critics/
Malware Attacks Targeting Syrian ISIS Critics
Jul 8, 2017 - This report describes a malware attack on a Syrian citizen media group critical of Islamic State of Iraq and Syria (ISIS).
malware attackssyrian isis
https://www.av-test.org/en/news/disguise-and-deception-how-brand-new-malware-attacks-are-carried-out-on-windows-systems/
Disguise and deception – how brand-new malware attacks are carried out on Windows systems
brand newmalware attacks
https://securityaffairs.com/189820/malware/iran-linked-actors-use-telegram-as-c2-in-malware-attacks-on-dissidents.html
Iran-linked actors use Telegram as C2 in malware attacks on dissidents
Mar 23, 2026 - Iran-linked actors use Telegram as C2 to spread malware targeting dissidents and journalists, enabling surveillance and data theft.
iran linkedactors usetelegram
https://citizenlab.ca/2013/06/a-call-to-harm/
A Call to Harm: New Malware Attacks Target the Syrian Opposition
Jul 8, 2017 - This research report by Morgan Marquis-Boire and John Scott Railton examines two recent cyber attacks targeting the Syrian opposition: malware masquerading as...
malware attackscallharmnew
https://www.cybersecuritydive.com/news/ai-cyberattacks-malware-open-source-phishing-gartner/750283/
From malware to deepfakes, generative AI is transforming attacks | Cybersecurity Dive
Generative AI is even helping hackers trick open-source developers into using malicious code, according to Gartner.
generative aimalwaredeepfakes
https://citizenlab.ca/2015/10/targeted-attacks-ngo-burma/
Targeted Malware Attacks against NGO Linked to Attacks on Burmese Government Websites - The Citizen...
Jun 23, 2020 - This report analyzes a campaign of targeted attacks against an NGO working on environmental issues in Southeast Asia.
malware attackstargetedngo
https://www.bleepingcomputer.com/news/security/cisa-exposes-malware-kits-deployed-in-ivanti-epmm-attacks/
CISA exposes malware kits deployed in Ivanti EPMM attacks
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has published an analysis of the malware deployed in attacks exploiting vulnerabilities...
cisaexposesmalwarekitsivanti
https://cloudnativenow.com/contributed-content/how-distroless-containers-defend-against-npm-malware-attacks/
How Distroless Containers Defend Against npm Malware Attacks - Cloud Native Now
Oct 22, 2025 - The npm breach shows why distroless containers matter. Minimal, continuously rebuilt images strengthen cloud-native supply-chain security.
distroless containersdefend
https://blogs.jpcert.or.jp/en/2025/07/ivanti_cs.html
Malware Identified in Attacks Exploiting Ivanti Connect Secure Vulnerabilities - JPCERT/CC Eyes |...
JPCERT/CC Eyes previously introduced the...
ivanti connect securemalware
https://www.bleepingcomputer.com/news/security/clickfix-malware-attacks-evolve-with-multi-os-support-video-tutorials/
ClickFix malware attacks evolve with multi-OS support, video tutorials
ClickFix attacks have evolved to feature videos that guide victims through the self-infection process, a timer to pressure targets into taking risky actions,...
clickfix malwaremulti osvideo
https://bugzilla-archive.dlang.org/bugs/20027/
Bug 20027 – std.zip susceptible to zip malware attacks
std zipmalware attacksbug
https://www.bleepingcomputer.com/news/security/tiktok-videos-now-push-infostealer-malware-in-clickfix-attacks/
TikTok videos now push infostealer malware in ClickFix attacks
Cybercriminals are using TikTok videos to trick users into infecting themselves with Vidar and StealC information-stealing malware in ClickFix attacks.
infostealer malwaretiktokpush
https://www.sonatype.com/blog/open-source-malware-index-q3-2025
Open Source Malware Index Q3 2025: High-Severity Attacks Surge
Sonatype's Q3 2025 Malware Index reveals a 140% surge in open source malware and rising high-severity attacks targeting developers and AI.
open sourcemalware indexhigh
Sponsored https://www.instabang.com/
Instabang OFFICIAL - Free Adult Dating & Personals. Find an insta bang!
https://benchmarkmagazine.com/reports-highlights-surge-in-endpoint-malware-and-social-engineering-attacks/
Reports Highlights Surge in Endpoint Malware and Social Engineering Attacks – Benchmark
WatchGuard Technologies has released its latest Internet Security Report, analysing cyber threats observed by the WatchGuard Threat Lab during the third...
reports highlightssurgesocial
https://semgrep.dev/solutions/open-source-malware-protection/
Protect Against Open-Source Malware Attacks | Semgrep
Semgrep helps protect against open-source malware attacks by determining incident exposure, detecting and removing malicious packages, and configuring policies...
open sourcemalware attacks
https://www.bleepingcomputer.com/news/security/us-govt-exposes-new-north-korean-malware-phishing-attacks/
US govt exposes new North Korean malware, phishing attacks
The US government today released information on three new malware variants used in malicious cyber activity campaigns by a North Korean government-backed...
north koreanmalware phishing
https://www.helpnetsecurity.com/2019/12/13/network-attacks-2019/
As malware and network attacks increase in 2019, zero day malware accounts for 50% of detections -...
Dec 13, 2019 - Amid significant increases in both malware and network attacks, multiple Apache Struts vulnerabilities appeared as most popular network attacks in Q3 2019.
attacks increasezero day
https://finance.yahoo.com/news/2025-cybersecurity-trends-vipre-smes-090000239.html
2025 Cybersecurity Trends from VIPRE: SMEs a Target and AI Malware to Fuel Supply Chain Attacks,...
Jan 7, 2025 - 2024 saw increasingly sophisticated cybersecurity threats as criminals leveraged all forms of AI to create difficult-to-detect phishing attacks, deepfakes, and...
cybersecurity trendsvipresmes
https://www.guardsquare.com/android-malware
How to Prevent Malware Attacks on Android Apps | Guardsquare
Malware is increasingly targeting Android banking. Learn how Guardsquare helps to protects mobile applications against Android malware and Android attacks.
prevent malwareandroid apps
Sponsored https://www.naughtycharm.com/
NaughtyCharm
https://www.comparitech.com/antivirus/types-of-malware/
What is malware? Eight types of malware attacks explained
Mar 7, 2024 - We explain the eight most common types of malware, in simple terms, so you can understand online threats and how to protect your devices.
eight typesattacks explained