-
China-linked hackers targeted Qatar using fake war news lures to spread PlugX backdoor malware and spy on military and energy sectors.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Researchers at AllSecure have revealed how North Korean hackers from the Lazarus Group used a fake LinkedIn job interview and deepfake technology to target their CEO.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A new Android Remote Access Trojan (RAT) named SurxRAT, which is being sold as a commercial malware platform through a Telegram-based malware‑as‑a‑service (MaaS) ecosystem. The malware, marketed under the SURXRAT V5 branding, enables cybercriminals to …
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A wave of phishing campaigns that used signed malware posing as popular workplace apps like Microsoft Teams, Zoom, and Adobe Reader to deploy remote monitoring and management (RMM) backdoors. The activity, attributed to an as-yet unidentified threat ac…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Researchers warn of a fake CleanMyMac site using a ClickFix attack to install SHub Stealer on macOS and steal passwords and crypto wallets.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Researchers say Iran’s MuddyWater hackers targeted US companies and an Israeli software firm’s department in a cyber campaign using the Dindoor malware – All this amid the ongoing conflict.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A new Windows stealer dubbed BoryptGrab is being distributed through a large, ongoing campaign abusing fake GitHub repositories that pose as free tools, game cheats, and popular utilities. The malware focuses on stealing browser data, cryptocurrency wa…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A large-scale spear-phishing campaign distributing a VIP Keylogger variant sold as Malware-as-a-Service (MaaS). The campaign employs steganography, in-memory execution, and modular payload design to evade defenses while harvesting credentials across br…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
ClipXDaemon is a new Linux malware family that hijacks cryptocurrency clipboard data in X11 sessions, operating fully offline without any command‑and‑control (C2) infrastructure. It reuses a ShadowHS-style loader built with the public bincrypter framew…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Transparent Tribe (APT36) is moving from traditional, off‑the‑shelf tools to an AI-assisted malware model researchers now call “vibeware,” signaling how large language models are starting to industrialize mediocre but relentless attacks at scale. In i…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶


