VoidLink Malware Almost Entirely Built by AI, Experts Warn

By Abdul Wasay ⏐ 3 minutes ago ⏐ Newspaper Icon 3 min read

Cybersecurity researchers have identified a new strain of malware, codenamed VoidLink, that was created almost entirely using artificial intelligence. According to a detailed analysis from…

Massive Database Breach Exposes 149M Credentials from Facebook, Instagram, Gmail and More

By Abdul Wasay ⏐ 1 day ago ⏐ Newspaper Icon 3 min read

Cybersecurity researchers have confirmed that a massive trove of login credentials tied to Gmail, Instagram, Netflix, and dozens of other everyday platforms was left openly…

Why This New Ransomware is Impossible for Standard Security to Stop

By Abdul Wasay ⏐ 4 days ago ⏐ Newspaper Icon 3 min read

A newly identified Osiris ransomware variant is drawing urgent attention from cybersecurity researchers after evidence showed it can quietly slip past traditional defenses, establish persistence,…

The “Invisible Commands” That Let Hackers Hijack Anthropic’s Git Server

By Abdul Wasay ⏐ 5 days ago ⏐ Newspaper Icon 3 min read

Anthropic has patched three high-severity vulnerabilities in its official Git Model Context Protocol (MCP) server that researchers say could have been exploited to read and…

Why Your Ad Blocker Might Be Crashing Your Browser to Deliver Malware

By Abdul Wasay ⏐ 6 days ago ⏐ Newspaper Icon 4 min read

Security researchers have uncovered a sophisticated new malware campaign that intentionally crashes web browsers to trick users into downloading malicious software, with the attack leveraging…

New Dual-Stage Malware Marks a Terrifying Milestone in Cyberthreat Evolution

By Abdul Wasay ⏐ 1 week ago ⏐ Newspaper Icon 3 min read

Cybersecurity firms are tracking a significant evolution in the distribution tactics of the GootLoader malware family. Operators are now using a combination of compromised installers,…

Hackers Sneak Malware Into PCs Using Legitimate Programs

By Abdul Wasay ⏐ 2 weeks ago ⏐ Newspaper Icon 2 min read

Security researchers have disclosed an active malware campaign that exploits a DLL side-loading vulnerability in a legitimate binary linked to the open-source c-ares library to…

Hackers Are Using RustyWater Malware Against Prominent Middle East Targets

By Abdul Wasay ⏐ 2 weeks ago ⏐ Newspaper Icon 3 min read

Security researchers have confirmed that the Iran-linked advanced persistent threat group MuddyWater APT has launched a spear-phishing campaign deploying a Rust-based remote access Trojan (RAT)…

Cybercriminals Weaponize WhatsApp to Spread New Banking Malware

By Abdul Wasay ⏐ 3 weeks ago ⏐ Newspaper Icon 3 min read

WhatsApp has become the primary propagation channel for an active banking malware campaign after cybersecurity researchers confirmed that the Astaroth trojan is now spreading through…

Trust Wallet Chrome Extension Compromised in Supply Chain Hack

By Abdul Wasay ⏐ 4 weeks ago ⏐ Newspaper Icon 4 min read

Trust Wallet has confirmed that its Chrome browser extension was compromised after attackers injected malicious code through a third-party dependency, exposing users to potential cryptocurrency…

Critical MongoDB Vulnerability Exposes Servers to Attack

By Abdul Wasay ⏐ 4 weeks ago ⏐ Newspaper Icon 2 min read

MongoDB administrators are scrambling to assess exposure after security researchers spotlighted a newly disclosed server flaw that can leak uninitialized heap memory to an unauthenticated…

New Evasive Panda Attacks Use DNS in Stealthy Cyberattacks

By Abdul Wasay ⏐ 1 month ago ⏐ Newspaper Icon 3 min read

A China-linked threat group tracked as Evasive Panda, also known in industry reporting as StormBamboo, Daggerfly, and Bronze Highland, has been tied to a targeted…

New MacSync Stealer Evades macOS Gatekeeper Protections

By Abdul Wasay ⏐ 1 month ago ⏐ Newspaper Icon 3 min read

A newly identified strain of macOS malware known as MacSync stealer has demonstrated the ability to bypass Apple’s Gatekeeper security protections, raising fresh concerns about…

Get Alerts