Hackers Use GitHub Repositories to Host Amadey Malware and Data Stealers, Bypassing Filters
Jul 17, 2025Ravie LakshmananMalware / Social Engineering Threat actors are leveraging public…
Hackers Leverage Microsoft Teams to Spread Matanbuchus 3.0 Malware to Targeted Firms
Jul 16, 2025Ravie LakshmananThreat Intelligence / Vulnerability Cybersecurity researchers have flagged a…
Fake Gaming and AI Firms Push Malware on Cryptocurrency Users via Telegram and Discord
Jul 10, 2025Ravie LakshmananCryptocurrency / Cybercrime Cryptocurrency users are the target of…
SEO Poisoning Campaign Targets 8,500+ SMB Users with Malware Disguised as AI Tools
Cybersecurity researchers have disclosed a malicious campaign that leverages search engine optimization…
Over 40 Malicious Firefox Extensions Target Cryptocurrency Wallets, Stealing User Assets
Jul 03, 2025Ravie LakshmananBrowser Security / Cryptocurrency Cybersecurity researchers have uncovered over…
North Korean Hackers Target Web3 with Nim Malware and Use ClickFix in BabyShark Campaign
Threat actors with ties to North Korea have been observed targeting Web3…
FBI Warns of Scattered Spider’s Expanding Attacks on Airlines Using Social Engineering
The U.S. Federal Bureau of Investigation (FBI) has revealed that it has…
Iranian APT35 Hackers Targeting Israeli Tech Experts with AI-Powered Phishing Attacks
Jun 26, 2025Ravie LakshmananCyber Espionage / Malware An Iranian state-sponsored hacking group…
Russian APT29 Exploits Gmail App Passwords to Bypass 2FA in Targeted Phishing Campaign
Jun 19, 2025Ravie LakshmananEmail Security / Identity Protection Threat actors with suspected…