Malware Alert
Android Security Alert: Fake Apps Abuse Hugging Face to Spread Spyware
Cybersecurity researchers are warning that the current AI boom has opened a new and dangerous attack surface on Android devices. A newly uncovered malware campaign…
Open Source Malware Surges Nearly 73% in 2025, Cybersecurity Report Shows
The number of malicious open source software packages discovered in 2025 jumped dramatically, with detections rising by about 73% compared with 2024, cybersecurity analysts say,…
Experts Detect Pakistan-Linked Cyber Espionage Campaign Targeting Indian Government
Cybersecurity researchers have identified a series of sophisticated Pakistan-linked cyber campaigns targeting Indian government entities, raising fresh concerns about state-aligned digital espionage and the evolving…
VoidLink Malware Almost Entirely Built by AI, Experts Warn
Cybersecurity researchers have identified a new strain of malware, codenamed VoidLink, that was created almost entirely using artificial intelligence. According to a detailed analysis from…
Massive Database Breach Exposes 149M Credentials from Facebook, Instagram, Gmail and More
Cybersecurity researchers have confirmed that a massive trove of login credentials tied to Gmail, Instagram, Netflix, and dozens of other everyday platforms was left openly…
Why This New Ransomware is Impossible for Standard Security to Stop
A newly identified Osiris ransomware variant is drawing urgent attention from cybersecurity researchers after evidence showed it can quietly slip past traditional defenses, establish persistence,…
The “Invisible Commands” That Let Hackers Hijack Anthropic’s Git Server
Anthropic has patched three high-severity vulnerabilities in its official Git Model Context Protocol (MCP) server that researchers say could have been exploited to read and…
Why Your Ad Blocker Might Be Crashing Your Browser to Deliver Malware
Security researchers have uncovered a sophisticated new malware campaign that intentionally crashes web browsers to trick users into downloading malicious software, with the attack leveraging…
New Dual-Stage Malware Marks a Terrifying Milestone in Cyberthreat Evolution
Cybersecurity firms are tracking a significant evolution in the distribution tactics of the GootLoader malware family. Operators are now using a combination of compromised installers,…
Hackers Sneak Malware Into PCs Using Legitimate Programs
Security researchers have disclosed an active malware campaign that exploits a DLL side-loading vulnerability in a legitimate binary linked to the open-source c-ares library to…
Hackers Are Using RustyWater Malware Against Prominent Middle East Targets
Security researchers have confirmed that the Iran-linked advanced persistent threat group MuddyWater APT has launched a spear-phishing campaign deploying a Rust-based remote access Trojan (RAT)…
Cybercriminals Weaponize WhatsApp to Spread New Banking Malware
WhatsApp has become the primary propagation channel for an active banking malware campaign after cybersecurity researchers confirmed that the Astaroth trojan is now spreading through…
Trust Wallet Chrome Extension Compromised in Supply Chain Hack
Trust Wallet has confirmed that its Chrome browser extension was compromised after attackers injected malicious code through a third-party dependency, exposing users to potential cryptocurrency…
