Web3 workers found themselves in the crosshairs of a cunning new ploy. Cybercriminals used a fake video conferencing platform, Meeten, to infect both Windows and Mac systems with the Realst cryptostealer. BlueAlpha embraced steal ...
Read More
A new Android malware, named DroidBot, is rewriting the rules of financial cybercrime, infiltrating cryptocurrency exchanges and banking apps across Europe. With 776 unique infections identified, this threat is turning smartphone ...
Read More
Misconfigured Docker servers have become a goldmine for threat actors spreading Gafgyt malware. Leveraging legitimate "alpine" images, attackers exploit Docker Remote API servers to infect systems and launch disruptive DDoS campa ...
Read More
Poison Ivy has resurfaced, targeting defense, government, and technology sectors with spear-phishing and watering hole attacks. Using fake websites, the group delivers Sliver RAT. SmokeLoader is making waves in Taiwan, with a new ...
Read More
Hackers are taking their malware to the gaming world. GodLoader, embedded in the Godot game engine, has compromised over 17,000 systems across platforms, using malicious scripts to steal credentials and install crypto miners. Rec ...
Read More
Cybercriminals are amplifying their attacks with increasingly sophisticated tactics. A threat actor named Matrix is driving a disruptive DDoS campaign, leveraging misconfigured IoT devices to build a formidable botnet. Deceptive ...
Read More
Espionage knows no borders, as Earth Estries demonstrated in its global campaign against telecom and government agencies. Armed with advanced tools, the Chinese APT group has been infiltrating networks across Asia-Pacific, the Mi ...
Read More
Cyberattacks are becoming more daring and multifaceted, targeting everything from global institutions to individual wallets. Russia-aligned TAG-110 is waging a cyber-espionage campaign against Central Asia, East Asia, and Europe, ...
Read More
With new strategies and evolving targets, threat actors are expanding their reach into unexpected domains. Researchers uncovered XenoRAT being distributed via Excel XLL files protected by ConfuserEx, marking a departure from its ...
Read More
From hijacked IoT devices to recruitment on the dark web, the cyber threat landscape is growing increasingly diverse. The Ngioweb malware has constructed a massive botnet of 35,000 IoT devices, repurposing them for residential pr ...
Read More