In cyberspace, images can tell lies and trust can be a trap. HP Wolf Security exposed campaigns embedding malware in images hosted on archive[.]org, spreading VIP Keylogger and 0bj3ctivity Stealer through clever social engineeri ...
Read More
Fancy Bear, the infamous Russian APT, has taken a diplomatic twist, using Kazakhstan government documents as phishing bait to infiltrate Central Asian officials with HATVIBE and CHERRYSPY malware. WordPress site owners face a gro ...
Read More
FunkSec’s low-ransom chaos redefines ransomware economics. With a strategy of low ransom demands and discounted stolen data, FunkSec blends hacktivism roots with AI-assisted ransomware operations. Codefinger flips the script on c ...
Read More
CrowdStrike’s name has been weaponized in a phishing campaign, with cybercriminals posing as recruiters to dupe job seekers into installing XMRig miner. Socket exposed a shadowy scheme where npm packages masquerade as legitimate ...
Read More
The relentless evolution of cyber threats continues with the emergence of Gayfemboy, a Mirai-based botnet leveraging zero-day exploits to compromise industrial routers and smart home devices. In the Middle East, fraudsters posing ...
Read More
Discord, texts, and emails are now battlegrounds for cybercriminals, who disguise malware distribution as beta testing invites for new video games. Victims download installers for multiple info-stealers, unknowingly exposing sens ...
Read More
The cyber threat landscape continues to evolve, with attackers leveraging supply chain vulnerabilities to breach critical platforms. The Nomic Foundation and Hardhat fell victim to a supply chain attack involving 20 malicious npm ...
Read More
Cyber threats continue to shapeshift, introducing new challenges for defenders worldwide. A new phishing-as-a-service platform, FlowerStorm, has surfaced, targeting Microsoft 365 users across multiple countries and filling the g ...
Read More
Spyware dressed as a health tool - the BMI CalculationVsn app exposed how malicious actors exploit even mundane utilities to infiltrate devices. Found on the Amazon Appstore, the app secretly recorded screens, scanned installed a ...
Read More
Threat actors are sharpening their focus on developers, cryptocurrency projects, and unsuspecting corporate users, leveraging creative and deceptive methods to achieve their goals. Malicious VSCode extensions posing as productivi ...
Read More