Cyber security news for all

More

    Malware & Threats

    Hackers Exploit Images to Deploy VIP Keylogger and 0bj3ctivity Stealer

    Cybercriminals have been caught embedding harmful code within images to distribute malware such as VIP Keylogger and 0bj3ctivity Stealer in two distinct attack campaigns. “Both...

    Lazarus Group Exploits Web3 Developers via Fabricated LinkedIn Personas in “Operation 99”

    The notorious Lazarus Group, closely linked to North Korea, has orchestrated a sophisticated cyber offensive labeled Operation 99. This campaign zeroes in on software...

    Expired Domains Exploited to Command Over 4,000 Breached Systems

    A staggering 4,000 distinct web backdoors, initially deployed by an array of cyber adversaries, have been subverted by seizing control of lapsed and abandoned...

    FireScam Malware Impersonates Telegram Premium to Exploit Android Devices

    A sophisticated Android malware known as FireScam has emerged, masquerading as a premium version of the Telegram messaging app to exfiltrate data and secure...

    Rspack npm Packages Breached in Supply Chain Attack: Crypto Mining Malware Deployed

    The maintainers of Rspack have disclosed a security breach impacting two of their npm packages, @rspack/core and @rspack/cli, in a software supply chain attack....

    Thousands Download Malicious npm Libraries Masquerading as Genuine Tools

    Malevolent actors have been identified deploying counterfeit npm libraries that mimic legitimate packages such as typescript-eslint and @types/node, resulting in thousands of downloads from...

    Recent Articles