Malware Software Supply Chain6 Min Read November 13, 2025 Over 67,000 Fake npm Packages Flood Registry in Worm-Like Spam Attack Cybersecurity researchers are calling attention to a large-scale spam campaign that has flooded the npm registry with thousands of fake…
Cybercrime Malware3 Min Read November 12, 2025 Google Sues China-Based Hackers Behind $1 Billion Lighthouse Phishing Platform Google has filed a civil lawsuit in the U.S. District Court for the Southern District of New York (SDNY) against China-based hackers who are…
Malware Network Security3 Min Read November 11, 2025 GootLoader Is Back, Using a New Font Trick to Hide Malware on WordPress Sites The malware known as GootLoader has resurfaced yet again after a brief spike in activity earlier this March, according to new findings from…
Malware Software Supply Chain2 Min Read November 11, 2025 Researchers Detect Malicious npm Package Targeting GitHub-Owned Repositories Cybersecurity researchers have discovered a malicious npm package named "@acitons/artifact" that typosquats the legitimate "@actions/artifact"…
Cyber Espionage Malware5 Min Read November 7, 2025 From Log4j to IIS, China’s Hackers Turn Legacy Bugs into Global Espionage Tools A China-linked threat actor has been attributed to a cyber attack targeting an U.S. non-profit organization with an aim to establish long-term…
Malware Supply Chain Attack3 Min Read November 7, 2025 Hidden Logic Bombs in Malware-Laced NuGet Packages Set to Detonate Years After Installation A set of nine malicious NuGet packages has been identified as capable of dropping time-delayed payloads to sabotage database operations and…
Data Protection Malware3 Min Read November 7, 2025 Google Launches New Maps Feature to Help Businesses Report Review-Based Extortion Attempts Google on Thursday said it's rolling out a dedicated form to allow businesses listed on Google Maps to report extortion attempts made by…
Malware Supply Chain Attack3 Min Read November 7, 2025 Vibe-Coded Malicious VS Code Extension Found with Built-In Ransomware Capabilities Cybersecurity researchers have flagged a malicious Visual Studio Code (VS Code) extension with basic ransomware capabilities that appears to…
Malware Vulnerability3 Min Read November 6, 2025 Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine A previously unknown threat activity cluster has been observed impersonating Slovak cybersecurity company ESET as part of phishing attacks…
Malware Network Security2 Min Read November 6, 2025 Hackers Weaponize Windows Hyper-V to Hide Linux VM and Evade EDR Detection The threat actor known as Curly COMrades has been observed exploiting virtualization technologies as a way to bypass security solutions and…
Malware Mobile Security3 Min Read November 3, 2025 Researchers Uncover BankBot-YNRK and DeliveryRAT Android Trojans Stealing Financial Data Cybersecurity researchers have shed light on two different Android trojans called BankBot-YNRK and DeliveryRAT that are capable of harvesting…
Cybersecurity Malware3 Min Read November 3, 2025 New HttpTroy Backdoor Poses as VPN Invoice in Targeted Cyberattack on South Korea The North Korea-linked threat actor known as Kimsuky has distributed a previously undocumented backdoor codenamed HttpTroy as part of a likely…
Browser Security Malware3 Min Read October 31, 2025 Nation-State Hackers Deploy New Airstalk Malware in Suspected Supply Chain Attack A suspected nation-state threat actor has been linked to the distribution of a new malware called Airstalk as part of a likely supply chain…
Malware Threat Intelligence3 Min Read October 31, 2025 China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats A China-affiliated threat actor known as UNC6384 has been linked to a fresh set of attacks exploiting an unpatched Windows shortcut…
Malware Secure Coding2 Min Read October 31, 2025 Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery Eclipse Foundation, which maintains the open-source Open VSX project, said it has taken steps to revoke a small number of tokens that were…
Cybercrime Malware2 Min Read October 30, 2025 Russian Ransomware Gangs Weaponize Open-Source AdaptixC2 for Advanced Attacks The open-source command-and-control (C2) framework known as AdaptixC2 is being used by a growing number of threat actors, some of whom are…
Malware Threat Intelligence2 Min Read October 29, 2025 10 npm Packages Caught Stealing Developer Credentials on Windows, macOS, and Linux Cybersecurity researchers have discovered a set of 10 malicious npm packages that are designed to deliver an information stealer targeting…
Malware Vulnerability2 Min Read October 29, 2025 Active Exploits Hit Dassault and XWiki — CISA Confirms Critical Flaws Under Attack Threat actors are actively exploiting multiple security flaws impacting Dassault Systèmes DELMIA Apriso and XWiki, according to alerts…
Malware Mobile Security2 Min Read October 28, 2025 New Android Trojan 'Herodotus' Outsmarts Anti-Fraud Systems by Typing Like a Human Cybersecurity researchers have disclosed details of a new Android banking trojan called Herodotus that has been observed in active campaigns…
Data Breach Malware6 Min Read October 28, 2025 Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains Threat actors tied to North Korea have been observed targeting the Web3 and blockchain sectors as part of twin campaigns tracked as GhostCall…
Malware Vulnerability4 Min Read October 28, 2025 Chrome Zero-Day Exploited to Deliver Italian Memento Labs' LeetAgent Spyware The zero-day exploitation of a now-patched security flaw in Google Chrome led to the distribution of an espionage-related tool from Italian…
Cyber Espionage Malware3 Min Read October 28, 2025 SideWinder Adopts New ClickOnce-Based Attack Chain Targeting South Asian Diplomats A European embassy located in the Indian capital of New Delhi, as well as multiple organizations in Sri Lanka, Pakistan, and Bangladesh, have…
Cyber Espionage Malware3 Min Read October 24, 2025 APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign A Pakistan-nexus threat actor has been observed targeting Indian government entities as part of spear-phishing attacks designed to deliver a…
Hacking News Malware3 Min Read October 24, 2025 3,000 YouTube Videos Exposed as Malware Traps in Massive Ghost Network Operation A malicious network of YouTube accounts has been observed publishing and promoting videos that lead to malware downloads, essentially abusing…
DevOps Malware3 Min Read October 24, 2025 Self-Spreading 'GlassWorm' Infects VS Code Extensions in Widespread Supply Chain Attack Cybersecurity researchers have discovered a self-propagating worm that spreads via Visual Studio Code (VS Code) extensions on the Open VSX…
Cyber Espionage Malware1 Min Read October 22, 2025 Iran-Linked MuddyWater Targets 100+ Organisations in Global Espionage Campaign The Iranian nation-state group known as MuddyWater has been attributed to a new campaign that has leveraged a compromised email account to…
Cybersecurity Malware2 Min Read October 22, 2025 Ukraine Aid Groups Targeted Through Fake Zoom Meetings and Weaponized PDF Files Cybersecurity researchers have disclosed details of a coordinated spear-phishing campaign dubbed PhantomCaptcha targeting organizations…
Malware Vulnerability2 Min Read October 21, 2025 PolarEdge Targets Cisco, ASUS, QNAP, Synology Routers in Expanding Botnet Campaign Cybersecurity researchers have shed light on the inner workings of a botnet malware called PolarEdge. PolarEdge was first documented by Sekoia…
Browser Security Malware2 Min Read October 20, 2025 131 Chrome Extensions Caught Hijacking WhatsApp Web for Massive Spam Campaign Cybersecurity researchers have uncovered a coordinated campaign that leveraged 131 rebranded clones of a WhatsApp Web automation extension for…
Malware Threat Intelligence2 Min Read October 18, 2025 Silver Fox Expands Winos 4.0 Attacks to Japan and Malaysia via HoldingHands RAT The threat actors behind a malware family known as Winos 4.0 (aka ValleyRAT) have expanded their targeting footprint from China and Taiwan to…
Blockchain Malware3 Min Read October 17, 2025 North Korean Hackers Combine BeaverTail and OtterCookie into Advanced JS Malware The North Korean threat actor linked to the Contagious Interview campaign has been observed merging some of the functionality of two of its…
Cybercrime Malware2 Min Read October 17, 2025 Microsoft Revokes 200 Fraudulent Certificates Used in Rhysida Ransomware Campaign Microsoft on Thursday disclosed that it revoked more than 200 certificates used by a threat actor it tracks as Vanilla Tempest to fraudulently…
Blockchain Malware2 Min Read October 16, 2025 North Korean Hackers Use EtherHiding to Hide Malware Inside Blockchain Smart Contracts A threat actor with ties to the Democratic People's Republic of Korea (aka North Korea) has been observed leveraging the EtherHiding technique…
Cloud Security Malware3 Min Read October 16, 2025 Hackers Abuse Blockchain Smart Contracts to Spread Malware via Infected WordPress Sites A financially motivated threat actor codenamed UNC5142 has been observed abusing blockchain smart contracts as a way to facilitate the…
Malware Vulnerability2 Min Read October 16, 2025 LinkPro Linux Rootkit Uses eBPF to Hide and Activates via Magic TCP Packets An investigation into the compromise of an Amazon Web Services (AWS)-hosted infrastructure has led to the discovery of a new GNU/Linux rootkit…
Malware Ransomware Supply Chain Vulnerabilities2 Min Read October 16, 2025 CISA Warns Of Adobe Experience Manager Forms 0-Day Vulnerability Exploited In Attacks The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical alert regarding a severe code execution vulnerability in…
Data Breach Malware Vulnerabilities Windows3 Min Read October 16, 2025 Operation Zero Disco: Critical Cisco SNMP Flaw (CVE-2025-20352) Used to Implant Linux Rootkits on Switches researchers from Trend Research have uncovered a sophisticated campaign — dubbed “Operation Zero Disco” — in which…
Data Breach Malware Vulnerabilities3 Min Read October 16, 2025 Critical Samba RCE Flaw CVE-2025-10230 (CVSS 10.0) Allows Unauthenticated Command Injection on AD DCs The Samba Team has released an urgent advisory addressing two , including a critical command injection (CVE-2025-10230) that could allow…
Malware Software Supply Chain3 Min Read October 15, 2025 Over 100 VS Code Extensions Exposed Developers to Hidden Supply Chain Risks New research has uncovered that publishers of over 100 Visual Studio Code (VS Code) extensions leaked access tokens that could be exploited by…
Data Breach Malware Ransomware Vulnerabilities3 Min Read October 15, 2025 Capita Fined £14m After 2023 Breach that Hit 6.6 Million People Capita will not appeal a £14m regulatory penalty for security failings that led to a 2023 data breach impacting nearly seven million…
Apple Malware Ransomware Vulnerabilities4 Min Read October 15, 2025 Sekoia Exposes PolarEdge Backdoor: Custom mbedTLS C2 Compromising Cisco, QNAP, and Synology Devices Sekoia Threat Detection & Response (TDR) researchers have published an in-depth technical analysis of the PolarEdge Backdoor, a stealthy…
Malware Network Ransomware Vulnerabilities2 Min Read October 14, 2025 PolarEdge With Custom TLS Server Uses Custom Binary Protocol for C2 Communication A sophisticated backdoor malware targeting Internet of Things devices has surfaced, employing advanced communication techniques to maintain…