Cyber security news for all

More

    Malware & Threats

    New ‘Sneaky 2FA’ Phishing Kit Exploits Microsoft 365 Accounts with 2FA Evasion Tactics

    Cybersecurity experts have unveiled a sophisticated adversary-in-the-middle (AitM) phishing kit, dubbed Sneaky 2FA, which targets Microsoft 365 accounts by circumventing two-factor authentication (2FA) protections....

    Python-Driven Bots Exploiting PHP Servers Ignite Gambling Platform Expansion

    Cybersecurity specialists have uncovered a sophisticated campaign targeting servers running PHP applications to bolster gambling platforms predominantly in Indonesia. "Over the last two months, an...

    Hackers Exploit Images to Deploy VIP Keylogger and 0bj3ctivity Stealer

    Cybercriminals have been caught embedding harmful code within images to distribute malware such as VIP Keylogger and 0bj3ctivity Stealer in two distinct attack campaigns. “Both...

    Lazarus Group Exploits Web3 Developers via Fabricated LinkedIn Personas in “Operation 99”

    The notorious Lazarus Group, closely linked to North Korea, has orchestrated a sophisticated cyber offensive labeled Operation 99. This campaign zeroes in on software...

    Expired Domains Exploited to Command Over 4,000 Breached Systems

    A staggering 4,000 distinct web backdoors, initially deployed by an array of cyber adversaries, have been subverted by seizing control of lapsed and abandoned...

    FireScam Malware Impersonates Telegram Premium to Exploit Android Devices

    A sophisticated Android malware known as FireScam has emerged, masquerading as a premium version of the Telegram messaging app to exfiltrate data and secure...

    Recent Articles