Tarrask is a new malware identified by Microsoft that is used by the Chinese-sponsored hacker group Hafnium to maintain persistence on compromised Windows PCs by generating and hiding scheduled activities. The Hafnium group has been spotted expanding on selected areas such as telecommunications, internet service providers, and data services over the time. Threat actors reportedly seen using unpatched zero-day vulnerabilities as initial vectors, and then use Impacket tooling for later movement and execution, as well as the discovery of defense-evading Tarrask malware that creates hidden scheduled tasks, and then take action to remove the task aspects, so that the scheduled tasks cannot be identified by conventional methods. Secret scheduled tasks employed in this campaign to re-establish outbound connections to command-and-control (C2) infrastructure, allowing them to keep access to vital assets exposed to the internet even after restarting.
Security researchers have identified a new variant of the SparkCat malware circulating on both the Apple App Store and Google Play Store, more than a year after its initial discove...
The European Union’s cybersecurity agency, CERT-EU, has attributed a significant cloud breach involving the European Commission to the TeamPCP threat group. The attack targeted t...
Microsoft has rolled out automatic updates for unmanaged Windows 11 24H2 Home and Pro edition devices to Windows 11 25H2, also known as the Windows 11 2025 Update. This transition ...