A multi-stage malware loader known as OysterLoader has continued to evolve into early 2026, refining its command-and-control (C2) infrastructure and obfuscation methods.
Security researchers Zscaler found a new loader used in different infostealing campaigns CoffeeLoader uses multiple tricks to bypass security and drop additional payloads Interestingly enough, it ...
Two different payloads are hiding in audio files, each paired with one of three loaders. Audio .WAV files are the latest hiding place for obfuscated malicious code; a campaign has been spotted in ...
Threat analysts have discovered a new obfuscation technique used by the Hive ransomware gang, which involves IPv4 addresses and a series of conversions that eventually lead to downloading a Cobalt ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results