Global Surge in Fake Captcha Attacks

How Fake Captcha Campaigns are Distributing Lumma Stealer Over the past four weeks, we’ve protected more than 1.4 million customers against attempts to distribute malware through various fake Captcha campaigns, highlighting the sheer scale and persistence of these attacks. The primary malware being distributed, Lumma Stealer, poses a significant threat to users as it is […]
How Elon Musk ‘Almost’ Made Me Rich: A TikTok Tale

A shocking encounter with a fake Elon Musk and tips to avoid social media scams On Instagram or TikTok, it’s common to receive follow requests from random people — even if your account is private. You might see requests from a few friends, someone you met years ago at a party or the occasional bot […]
Part-Time Job Scams: A Growing Threat

Scammers Now Using Phone Calls to Initiate Fraudulent Schemes The promise of easy money can often be too tempting to ignore, especially when it arrives via popular messaging platforms like WhatsApp and Telegram. Yet, lurking behind these seemingly benign job offers is a new, insidious form of scam that leverages social engineering to exploit the […]
Q2 2024 Cybersecurity Trends: Rising Threats from Ransomware, Social Engineering and Identity Theft

Discover the latest cyberthreats — social engineering, ransomware and identity theft — and learn how to protect yourself In today’s digital age, where cybersecurity concerns touch every aspect of our lives — from personal privacy to global business operations — staying informed is crucial. As cyberthreats continue to evolve and cyberattacks persist, our analysis of […]
Decrypted: Mallox ransomware

Researchers uncover flaw in Mallox ransomware, offering free file recovery for early victims Researchers from Avast have discovered a flaw in the cryptographic schema of the Mallox ransomware variant that was prevalent during 2023 and early in 2024. Victims of the ransomware may be able to restore their files for free if they were attacked […]
How a Skype notification turned into a costly lesson

A Cautionary Tale of Digital Deception Imagine you are enjoying your weekend when you suddenly get a notification. You check it out, and it turns out it’s from Skype—yes, that old software you didn’t even remember you had installed. You open it up and find that someone has added you to a group called “Options […]
Glove Stealer: Leveraging IElevator to Bypass App-Bound Encryption & Steal Sensitive Data

A .NET malware, bypasses Chrome’s App-Bound Encryption, stealing data from browsers, crypto wallets, 2FA authenticators Key points: Glove Stealer is an information stealer written in .NET, stealing sensitive data from wide range of browser extensions as well as locally installed software It focuses on browser data (cookies, autofill, …), cryptocurrency wallets, 2FA authenticators, password […]
Gen Q3/2024 Threat Report

2 Million Users Protected from Fake CAPTCHA Scams, Ransomware Risk Doubled, and Lumma Information Stealer Surges Eleven-Fold Foreword The Gen Q3/2024 Threat Report is here, offering an in-depth look at the forces reshaping the threat landscape. Scams continued to dominate, while other serious threats—including malvertising, ransomware, droppers, and data-stealing malware—surged ahead. Many of these […]
Predictions 2025: Navigating the Future of Cybersecurity

Exploring Tomorrow’s Threats, Today’s Solutions: Predictions for the Cybersecurity Landscape in 2025 Today, technology is deeply woven into our daily lives and is advancing at an extraordinary pace. All of the progress in tech, however, comes with an equal measure of risk. In 2024, large-scale data breaches dominated headlines, while AI pushed the […]
Cybercriminals Actively Leveraging ChatGPT To Create And Refine Malicious Payloads

How ChatGPT Is Aiding Cybercriminals in Crafting Advanced Malware Scripts Clipboard Protection Reveals ChatGPT’s Role in Malware Attacks Attackers are constantly seeking innovative ways to deliver malicious payloads – harmful malware components. Our Norton, Avast and AVG brands recently launched Clipboard Protection, and the feature has uncovered an intriguing new development. Through Clipboard Protection, which […]