Recent research has brought to light a concerning new malware campaign. Security researchers have uncovered a stealthy backdoor malware distributed with a Monero cryptominer, using the PyBitmessage library for encrypted P2P communication to evade detection. Meanwhile, a threat actor known as Hazy Hawk has been exploiting DNS misconfigurations to hijack abandoned cloud assets from major targets. In a separate campaign, over 100 malicious Chrome extensions masquerading as legitimate tools have been exposed, designed to steal credentials, hijack sessions, and inject unwanted ads. Continue reading for the cybersecurity updates from the past 24 hours.