Android Trojan Crocodilus Now Active in 8 Countries, Targeting Banks and Crypto Wallets
Jun 03, 2025Ravie LakshmananMobile Security / Malware A growing number of malicious…
Preinstalled Apps on Ulefone, Krüger&Matz Phones Let Any App Reset Device, Steal PIN
Jun 02, 2025Ravie LakshmananMobile Security / Vulnerability Three security vulnerabilities have been…
Fake Recruiter Emails Target CFOs Using Legit NetBird Tool Across 6 Global Regions
Cybersecurity researchers have warned of a new spear-phishing campaign that uses a…
U.S. DoJ Seizes 4 Domains Supporting Cybercrime Crypting Services in Global Operation
May 31, 2025Ravie LakshmananMalware / Cyber Crime A multinational law enforcement operation…
China-Linked Hackers Exploit SAP and SQL Server Flaws in Attacks Across Asia and Brazil
May 30, 2025Ravie LakshmananVulnerability / Threat Intelligence The China-linked threat actor behind…
New EDDIESTEALER Malware Bypasses Chrome’s App-Bound Encryption to Steal Browser Data
A new malware campaign is distributing a novel Rust-based information stealer dubbed…
Cybercriminals Target AI Users with Malware-Loaded Installers Posing as Popular Tools
Fake installers for popular artificial intelligence (AI) tools like OpenAI ChatGPT and…
How ‘Browser-in-the-Middle’ Attacks Steal Sessions in Seconds
May 28, 2025The Hacker NewsBrowser Security / Credential Theft Would you expect…
New Self-Spreading Malware Infects Docker Containers to Mine Dero Cryptocurrency
May 27, 2025Ravie LakshmananCloud Security / Threat Intelligence Misconfigured Docker API instances…


