-
Researchers at Hudson Rock have identified a live infection where an infostealer exfiltrated a victim’s OpenClaw configuration. The discovery highlights a shift in malware behaviour toward harvesting personal AI identity files.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Cybersecurity experts at Moonlock Lab have discovered a new ClickFix attack. Hackers are using hijacked Google Ads and fake Claude AI guides to trick Mac users into installing the data-stealing MacSync malware.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Operational Relay Box (ORB) networks are covert, mesh-based infrastructures used by advanced threat actors to hide the true origin of their cyberattacks. Built from compromised Internet-of-Things (IoT) devices, Small Office/Home Office (SOHO) routers, …
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
The European Commission reports a cyber attack on its central mobile infrastructure that may have exposed staff names and phone numbers.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Cisco Talos uncovers DKnife, a China-nexus framework targeting routers and edge devices. Learn how seven stealthy implants hijack data and deliver malware via AitM attacks.
·
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Cybersecurity firm eSentire’s TRU break down the Russian Prometei botnet attack on a UK firm, detailing its TOR usage, password theft and decoy tactics.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Flickr says a third-party email vendor flaw may have exposed user names, emails, IP data, and activity logs,…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A worrying shift in the tactics of “Transparent Tribe,” a notorious threat group also known as APT36. Historically focused on Indian government, defense, and educational sectors, the group has now expanded its scope to target India’s growin…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A significant surge in Odyssey Stealer activity is currently targeting macOS users across multiple continents, with recent telemetry data revealing a dramatic geographic expansion of this sophisticated information-stealing campaign. Security researcher…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶


