Trojanized jQuery Infiltrates npm, GitHub, and CDNs: Thousands of Packages at...
Phylum uncovers large-scale trojanized jQuery attacks targeting npm, GitHub, and CDNs. Malicious actors steal user form data through…
View ArticleEldorado Ransomware Targeting Windows and Linux with New Malware
Another day, another threat against Windows and Linux systems!
View ArticleNew Data-Stealing Poco RAT Campaign Targeting Spanish Speakers
New Poco RAT Malware Targets Spanish Speakers Through Emails! Disguised as financial documents, Poco RAT steals your info…
View ArticleNuGet Packages Exploited to Target Developers with Malware
NuGet packages are under attack! A new malware campaign exploits hidden code execution techniques to inject malware into…
View ArticleIraqi Hackers Exploit PyPI to Infiltrate Systems Through Python Packages
Python packages are being used to steal data from developers and companies. Learn about the extensive cybercriminal operation…
View ArticleIran’s MuddyWater APT targets Saudis and Israelis with BugSleep Backdoor
New Backdoor ‘BugSleep’ Discovered in MuddyWater Phishing Attacks. Cybersecurity researchers uncover a custom-made backdoor used by the notorious…
View ArticleUnidentified Attacker “Revolver Rabbit” Uses RDGA to Register 500,000 Domains
Although not new, Registered Domain Generation Algorithms (RDGAs) have become a major cybersecurity threat, exploited by threat actors…
View ArticleBeware Grand Theft Auto Fans! Fake GTA VI Beta Download Spreads Malware
Grand Theft Auto VI fans beware of Fake GTA VI Beta download ads! Don’t get scammed by fake…
View ArticleFake Hot Fix for CrowdStrike ”crowdstrike-hotfix.zip” Spreads Remcos RAT
Beware “crowdstrike-hotfix.zip”! This fake file spreads Remcos malware, targeting LatAm CrowdStrike users. Don’t download it! Learn how to…
View ArticleTelegram Android Vulnerability “EvilVideo” Sends Malware as Videos
EvilVideo exploit in Telegram for Android lets attackers send malware disguised as videos. ESET discovered this zero-day vulnerability,…
View Article