Cyber security news for all

More

    Malware & Threats

    Hackers Exploit Google Sheets for Malware Command in Potential Espionage Operation

    Cybersecurity experts have uncovered a new malware operation that uses Google Sheets as a command-and-control (C2) platform. Starting on August 5, 2024, Proofpoint detected this...

    U.S. Agencies Highlight Iranian Cyber Group’s Persistent Ransomware Attacks

    U.S. cybersecurity and intelligence agencies have issued warnings regarding an Iranian hacking group that has breached numerous organizations across the nation and collaborated with...

    New PG_MEM Malware Targets PostgreSQL Databases for Crypto Mining

    Cybersecurity researchers have identified a new malware strain named PG_MEM, which is specifically designed to mine cryptocurrency by infiltrating PostgreSQL database instances through brute-force...

    New macOS Malware “TodoSwift” Linked to North Korean Cyber Espionage

    Cybersecurity experts have identified a new macOS malware strain called "TodoSwift," which shares characteristics with known malicious software linked to North Korean hacking groups. Christopher...

    Hackers Exploit PHP Vulnerability to Deploy Stealthy Msupedge Backdoor

    A newly identified backdoor called Msupedge has been used in a cyberattack targeting a university in Taiwan. "The most notable feature of this backdoor is...

    New Banshee Stealer Targets Over 100 Browser Extensions on macOS Systems

    Cybersecurity experts have discovered a new piece of stealer malware specifically crafted to attack Apple macOS systems. Known as Banshee Stealer, this malware is being...

    Recent Articles