-
Fake FileZilla downloads are being used to deliver a stealthy Remote Access Trojan (RAT) through a multi‑stage loader, putting careless downloaders at high risk of compromise. Attackers have set up a fake website that closely copies the look and layou…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
New research reveals that a new ACRStealer variant is now being actively deployed as a final payload by HijackLoader, using low‑level syscalls, AFD-based networking, TLS C2, and flexible secondary payload delivery to evade detection and maximize data t…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Konni APT recently ran a multi-stage malware operation that hijacked KakaoTalk accounts to spread remote access trojans (RATs) through highly targeted spear‑phishing. The message used contextual content aligned with the victim’s role to build trust an…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
OpenClaw AI agents are facing significant security scrutiny following a recent CNCERT warning about insecure defaults and prompt-injection vulnerabilities. The most critical risk for defenders is not just abstract model confusion, but the ability of an…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Cybersecurity defenders identified a surge in network breaches originating from compromised FortiGate Next-Generation Firewalls. According to incident responders at SentinelOne, threat actors exploit recent vulnerabilities to extract configuration file…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Attackers are evolving a well-known Microsoft Teams and Quick Assist social-engineering playbook to install a new, stealthy backdoor dubbed A0Backdoor. The campaign closely mirrors activity previously attributed to Blitz Brigantine (also tracked as Sto…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Microsoft released an urgent out-of-band security update on March 13, 2026, to address a series of critical vulnerabilities in Windows 11. The update, identified as hotpatch KB5084597, specifically resolves Remote Code Execution (RCE) flaws within the …
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Meta has announced plans to permanently turn off end-to-end encryption for Instagram Direct Messages. Effective May 8, 2026, the social media platform will officially cease support for this critical security feature. This decision marks a significant c…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
The GlassWorm malware campaign has evolved, significantly escalating its attacks on software developers. Instead of embedding malware directly into initial releases, the threat actors are now using transitive dependencies to sneak malicious code into d…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
An unprecedented international law enforcement effort has successfully dismantled a massive cybercrime network. Coordinated by INTERPOL, the initiative targeted critical infrastructure used in phishing, malware, and ransomware campaigns worldwide. Oper…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶


