News
The latest update for your Cyber Security News
BadPilot Cyberattacks Help Hackers Target Networks
BadPilot cyberattacks have been fueling Russian hacker operations for years....
Read MoreNorth Korean Hackers Use forceCopy Malware to Steal Data
North Korean hackers are using forceCopy malware to steal browser-stored...
Read MoreFake Chrome Sites Spread ValleyRAT Malware via DLL Hijacking
Fake Chrome sites are being used to distribute ValleyRAT malware...
Read MorePassword Spraying: 13 Million Attempts
Password spraying is a growing threat using HTTP client tools...
Read MoreFERRET Malware Targets macOS Users via Fake Job Offers
FERRET malware is being used in a deceptive cyberattack targeting...
Read MoreCoyote Malware Expands, Targeting More Banks and Websites
Coyote malware is spreading rapidly, now attacking over 1,000 websites...
Read MoreGoogle Blocks 158,000 Malicious App Developers in 2024
Google has taken strong action against harmful Android apps in...
Read MoreCISA Warns of Backdoor in Patient Monitors
CISA and the FDA have issued urgent warnings about security...
Read MoreMalvertising Scam Uses Fake Ads to Steal Microsoft Logins
Malvertising scams are on the rise, with cybercriminals using fake...
Read MoreLazarus Group Uses Hidden Admin Panel for Cyber Attacks
Lazarus Group is using a hidden web-based admin panel to...
Read MoreTanzeem Malware Used for Spying in Targeted Attacks
Tanzeem malware is being used in targeted cyber attacks to...
Read MoreDeepSeek AI Data Leak Exposes Secret Keys and Logs
DeepSeek AI suffered a major security breach, exposing over a...
Read MoreMintsLoader Malware Spreads via Fake CAPTCHA Pages
MintsLoader malware is being used in cyberattacks targeting businesses in...
Read MorePNGPlug Malware Targets Users with Fake Installers
PNGPlug malware is spreading through fake software installers, targeting Chinese-speaking...
Read More13,000 MikroTik Routers Hijacked for Cyberattacks
MikroTik routers are at the center of a new cyber...
Read MoreMorpheus and HellCat Ransomware Found Sharing Code
Morpheus and HellCat, two new ransomware groups, have been discovered...
Read MoreQakBot-Linked Malware Gains Enhanced Remote Access Tools
QakBot, a notorious malware originally designed as a banking trojan,...
Read MoreMirai Botnet Hits Record DDoS Attack Linked to Indonesia
The Mirai botnet has launched a record-breaking distributed denial-of-service (DDoS)...
Read MorePlushDaemon APT Targets VPN Provider in Cyber Attack
PlushDaemon, a China-linked advanced persistent threat (APT) group, has launched...
Read MoreFake CAPTCHA Malware Targets Multiple Industries
Fake CAPTCHA campaigns are being used to spread the Lumma...
Read MoreHackers Use Images to Deploy Keyloggers and Stealers
Hackers are increasingly using images to conceal malware, including VIP...
Read MoreGoogle Ads Users Hit by Malvertising Phishing Scam
Google Ads users are the target of a sophisticated malvertising...
Read MorePython Malware Fuels RansomHub Ransomware Attacks
Python-based malware is powering a new wave of ransomware attacks,...
Read MoreBanshee Malware Threatens macOS Users with New Tactics
Banshee Stealer, a macOS-focused malware, has re-emerged with a stealthier...
Read MoreWordPress Skimmer Targets E-commerce Checkout Pages
WordPress e-commerce websites are the latest target of a stealthy...
Read MorePhishing Scam Targets iMessage Users
Phishing scams are increasingly targeting Apple iMessage users, exploiting a...
Read MoreMalware Exploits Windows UI Tools to Bypass Security
Malware creators have discovered a way to exploit Windows UI...
Read MoreMask APT Strikes Again with Advanced Multi-Platform Malware
Mask APT, also known as Careto, has resurfaced with a...
Read More3 Million Mail Servers at Risk Due to Missing Encryption
Over three million mail servers lack TLS encryption, leaving them...
Read MoreEAGERBEE Malware Targets ISPs and Governments
EAGERBEE, an advanced malware variant, is targeting ISPs and government...
Read MoreDoubleClickjacking Exploit Threatens Major Websites’ Security
A new exploit named DoubleClickjacking exposes vulnerabilities in major websites,...
Read MoreFireScam Malware Masquerades as Telegram to Steal Data
FireScam, a new Android malware, disguises itself as a Telegram...
Read MoreMalicious NPM Package Deploys Quasar RAT on Developer Systems
Malicious software targeting developers has surfaced in the form of...
Read MoreAI Jailbreak ‘Bad Likert Judge’ Raises Security Risks
A new AI jailbreak method, called Bad Likert Judge, poses...
Read MorePLAYFULGHOST Malware Targets Users via Phishing and SEO
Researchers have identified a new threat called PLAYFULGHOST. This malware...
Read MoreIran’s Charming Kitten Adopts New BellaCPP Malware Variant
Iran’s hacking group Charming Kitten is deploying a new malware...
Read MoreNorth Korean Hackers Unleash OtterCookie Malware in New Attack
North Korean hackers are using new OtterCookie malware to target...
Read MoreChrome Extensions Hacked: Data of 600K Users Exposed
Chrome extensions hacked, putting over 600,000 users at risk. A...
Read MoreMalicious npm Packages Trick Developers and Spread Trojan
Researchers have uncovered a campaign involving malicious npm packages impersonating...
Read MoreAndroid Malware Found Disguised as Health App
Researchers have discovered a malicious Android spyware app called “BMI...
Read MoreHubPhish Targets Microsoft Cloud with Phishing Scams
Cybersecurity researchers have uncovered a phishing campaign called HubPhish. This...
Read MoreBadBox Malware Infects 192K Android Devices Despite Crackdown
The BadBox Android malware botnet has now infected over 192,000...
Read MoreFake Job Offers Lead to Banking Trojan in New Phishing Scam
Cybersecurity experts have uncovered a new phishing scam targeting mobile...
Read MoreAI-Powered Investment Scam Targets Through Social Media Ads
A sophisticated investment scam is spreading across the globe, using...
Read MoreDeceptionAds Campaign Exploits Ad Networks to Steal Data
Cybersecurity experts have exposed a major malvertising campaign called DeceptionAds,...
Read MoreBotnet Exploits 85,000+ Devices for Illegal Proxy Service
The Socks5Systemz botnet is exploiting over 85,000 compromised devices to...
Read MoreBlack Basta Ramps Up Attacks Using Email Bombing
Black Basta ransomware is evolving, leveraging new tactics to target...
Read MoreCISA and FBI Warn About Exploited Vulnerabilities
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has flagged...
Read More390,000+ WordPress Accounts Compromised in New GitHub Scam
Hackers have stolen over 390,000 WordPress credentials by exploiting a...
Read MoreBashe Ransomware: A New Threat to Critical Industries
Bashe ransomware, an emerging cyber threat, has been targeting critical...
Read MoreFake Video Apps Steal Sensitive Data
Hackers are using fake video conferencing apps to target Web3...
Read MoreNew $3,000 Android Trojan Targets Banks
A newly discovered Android remote access trojan (RAT), called DroidBot,...
Read MoreHackers Use Corrupted Files to Evade Email Security Systems
Hackers are leveraging corrupted ZIP files and Microsoft Office documents...
Read MoreSmokeLoader Malware Targets Key Industries
A new campaign targeting Taiwan’s manufacturing, healthcare, and IT sectors...
Read MoreFake Emails Spread Malware in Retail Sector
A sophisticated malware campaign, dubbed Horns&Hooves, is targeting private users,...
Read MoreSpyLoan Malware Hits 8 Million Android Users via Loan Apps
A new wave of malicious Android apps has been discovered,...
Read MoreRussian Hackers Launch HATVIBE and CHERRYSPY Attacks Globally
Russian-linked hackers, identified as TAG-110, are behind a sophisticated cyber...
Read MoreGodot Game Engine Misused in Cross-Platform Malware Outbreak
Cybercriminals have turned the widely used Godot Engine into a...
Read MoreWordPress Anti-Spam Plugin Flaws Put 200,000+ Sites at Risk
Two major vulnerabilities have been discovered in a popular WordPress...
Read MoreMalware Exploits Vulnerable Drivers to Disable Antivirus Tools
Cybersecurity experts have uncovered a malicious campaign using the Bring...
Read MoreAI Scams on LinkedIn: North Korean Hackers Steal Millions
North Korean hackers, identified as Sapphire Sleet, have stolen over...
Read MoreChinese Hackers Target Telecoms Using GHOSTSPIDER Malware
A China-linked hacking group, identified as Earth Estries, has been...
Read MoreBabbleLoader Malware Delivering Advanced Stealers
A newly identified malware loader, BabbleLoader, is raising alarms due...
Read MoreNSO Group Exploits WhatsApp Even After Legal Challenges
Recent legal documents from an ongoing case reveal that the...
Read MoreHackers Exploit NFC to Steal Funds Through Mobile Payments
Cybercriminals are adopting a sophisticated attack method called “Ghost Tap,”...
Read MoreHelldown Ransomware Targets VMware and Linux Systems
Cybersecurity experts have identified a new variant of the Helldown...
Read MoreVietnamese Hackers Launch New PXA Stealer Targeting Asia
A Vietnamese-speaking hacking group has been linked to a campaign...
Read MoreMalware Targets Facebook Ads Manager to Stealing Credit Card Data
Cybersecurity researchers are raising alarms over an upgraded version of...
Read MoreHackers Exploit Windows NTLM Flaw to Spread RAT Malware
Cybersecurity researchers have discovered that a vulnerability in Windows NT...
Read MoreNew Malware Targets Gamers with Fake Game Boosting Apps
Cybersecurity experts have uncovered a dangerous malware framework called Winos...
Read MoreCopyright Scams Fuel Spread of Advanced Malware, Exploiting AI
A sophisticated phishing campaign has been leveraging copyright infringement claims...
Read MoreMassive ‘Sitting Ducks’ Scheme Exploits 70,000 Hijacked Domains for Cybercrime
Researchers have uncovered a large-scale cyberattack technique known as Sitting...
Read MoreRustyAttr Malware Exploits macOS Metadata in Cyber Threat
A newly identified malware called RustyAttr is targeting macOS systems...
Read MoreA Malware Targets Android Users with Fraudulent Money Transfers
A newly discovered Android banking malware, dubbed ToxicPanda, has infected...
Read MoreNew Phishing Kit Launches 2,000 Fake Sites Across 5 Countries
Cybersecurity researchers have unveiled a new phishing kit called Xiū...
Read MoreGit Config Leak Exposes 15,000 Credentials and Clones Private Repos
Cybersecurity researchers have identified an extensive attack campaign exploiting exposed...
Read MoreNew Malware Uses Linux VM to Bypass Windows Antivirus
Cybersecurity researchers have discovered a sophisticated malware campaign, CRON#TRAP, which...
Read MoreNew Phishing Tool Targets Developers with Precision Emails
Cybersecurity researchers have highlighted a new phishing tool, GoIssue, that...
Read MoreChinese Botnet Exploits Router Weaknesses to Steal Credentials
Recent findings by cybersecurity researchers indicate that a Chinese threat...
Read MoreYmir Ransomware Attacks on Corporate Networks
A new strain of ransomware, named Ymir, has been flagged...
Read MoreLightSpy Spyware Targets iPhones with Advanced Surveillance
Researchers have identified a more sophisticated version of the LightSpy...
Read MoreHackers Hijack Facebook Accounts to Spread Malware via Ads
A new malvertising campaign has been detected, using hijacked Facebook...
Read MoreNew Android Malware Exploits Calls to Steal Banking Information
Cybersecurity experts recently identified an updated version of the FakeCall...
Read MoreMalicious npm Packages with Malware Threaten Developers
In September 2024, three npm packages were found to be...
Read MoreVulnerability in Plugin Puts Millions of WordPress Sites at Risk
A severe vulnerability has been identified in the LiteSpeed Cache...
Read MoreNorth Korean Hackers Partner with Play Ransomware in Major Cyber Attack
Researchers have identified North Korean-affiliated threat actors collaborating with the...
Read MoreHacker Group TeamTNT Intensifies Cloud Attacks
The notorious hacking collective TeamTNT has initiated a fresh campaign...
Read MoreLazarus Group Exploits Google Chrome Flaw through Fake Gaming Site
The North Korean hacking group, known as the Lazarus Group,...
Read MoreCybercriminals Exploit LockBit’s Notoriety to Intimidate Victims
Cybercriminals have started to use the fame of the LockBit...
Read MoreCybercriminals Exploit EDRSilencer Tool to Bypass Security
Cybercriminals have recently begun exploiting the open-source tool EDRSilencer to...
Read MoreEnhanced Qilin.B Ransomware Adopts Anti-Detection Tactics
Cybersecurity experts have identified a new version of Qilin ransomware,...
Read MoreNew Grandoreiro Malware Variants Target Banks Worldwide
Newly evolved variants of the Grandoreiro banking malware are adopting...
Read MoreNew Cyber Attacks RomCom Unleashes RAT Variant
A recent wave of cyberattacks has targeted Ukrainian government agencies...
Read MoreApple’s macOS Flaw in Safari Privacy Controls Exposed, Now Patched
Microsoft has revealed details about a recently patched security vulnerability...
Read MoreInside Cicada3301: The Rising Ransomware Group and Its Affiliate Program
Cybersecurity researchers have uncovered new details about the ransomware-as-a-service (RaaS)...
Read MoreCrypt Ghouls Unleashes Ransomware Using LockBit 3.0 and Babuk
A new cybercriminal group, Crypt Ghouls, has been identified as...
Read MoreNew Wave of Astaroth Banking Malware via Spear-Phishing Scams
A new spear-phishing campaign is targeting Brazilian users, delivering the...
Read MoreFake Google Meet Pages Spread Infostealing Malware
Cybercriminals are using counterfeit Google Meet websites as part of...
Read MoreMalware Campaign Uses Stolen Certificates to Spread Hijack Loader
Cybersecurity experts have uncovered a new malware campaign that deploys...
Read MoreNew Phishing Tactics Target Finance and Insurance Sectors
A recent phishing campaign is using GitHub links to bypass...
Read More