Polymorphic Malware Quietly Slips Past Security Defenses, Experts Sound Alarm

By Abdul Wasay ⏐ 2 months ago ⏐ Newspaper Icon Newspaper Icon 2 min read

Security experts are raising alarms over a growing cyber threat that’s mutating faster than traditional defenses can keep up. Polymorphic malware, which constantly alters its…

Hackers Deploy DarkCloud Malware via Spear-Phishing to Steal Credentials

By Abdul Wasay ⏐ 2 months ago ⏐ Newspaper Icon Newspaper Icon 3 min read

A newly uncovered spear-phishing campaign is deploying DarkCloud, a sophisticated modular malware suite, in an effort to harvest keystrokes, FTP credentials, and system metadata from…

Research Suggests Gen Z Ironically Tops the List for Falling for Phishing Attacks

By Abdul Wasay ⏐ 2 months ago ⏐ Newspaper Icon Newspaper Icon 4 min read

A new global survey from Yubico reveals a troubling cybersecurity trend: 62% of Gen Z respondents said they had engaged with a phishing message in…

NCERT Warns of Trojanized AppSuite PDF Editor That Spreads Malware Globally

By Abdul Wasay ⏐ 2 months ago ⏐ Newspaper Icon Newspaper Icon 3 min read

Security researchers have issued a major cybersecurity alert following the discovery of a malicious campaign dubbed TamperedChef, which uses a trojanized version of the legitimate…

MalTerminal: The First Malware That Writes Its Own Ransomware On Demand

By Abdul Wasay ⏐ 2 months ago ⏐ Newspaper Icon Newspaper Icon 3 min read

Cybersecurity researchers have unveiled MalTerminal, a new malware tool powered by GPT-4 that can dynamically generate ransomware or reverse shell code on demand. Researchers have…

Massive npm Supply-Chain Attack: Shai-Hulud Worm Infects Over 180 Packages

By Abdul Wasay ⏐ 3 months ago ⏐ Newspaper Icon Newspaper Icon 3 min read

A new, alarming software supply-chain attack dubbed ‘Shai-Hulud’ has been uncovered targeting the JavaScript npm ecosystem. Researchers from several security firms, including Palo Alto Networks…

Experts Warn ChatGPT Calendar Integration Flaw Lets Attackers Steal Sensitive Emails

By Abdul Wasay ⏐ 3 months ago ⏐ Newspaper Icon Newspaper Icon 2 min read

A newly discovered vulnerability in ChatGPT’s calendar integration can be exploited to hijack users’ email accounts, according to researchers at EdisonWatch. The attack works by…

New Indicators Suggest LockBit 5.0 Ransomware May Be Coming Back

By Abdul Wasay ⏐ 3 months ago ⏐ Newspaper Icon Newspaper Icon 2 min read

Signs are emerging that the notorious ransomware group LockBit may be preparing a comeback under the new name “LockBit 5.0”, despite being targeted by global…

Hackers Exploit Docker APIs Using Tor, Build Self-Propagating Botnet

By Abdul Wasay ⏐ 3 months ago ⏐ Newspaper Icon Newspaper Icon 2 min read

Cybersecurity researchers have discovered a sophisticated new attack campaign exploiting exposed Docker APIs and hiding its tracks through the Tor network. The attack, first flagged…

NCERT Warns Of A Code Injection Vulnerability Affecting Worldwide

By Abdul Wasay ⏐ 3 months ago ⏐ Newspaper Icon Newspaper Icon 3 min read

An active and critical remote code execution vulnerability, CVE-2025-42957, is being exploited in SAP S/4HANA and related products. The flaw, rated 9.9 CVSS, allows remote…

Hackers Exploit Raw Disk Reads to Steal Senitive Files, Bypass EDR

By Abdul Wasay ⏐ 3 months ago ⏐ Newspaper Icon Newspaper Icon 2 min read

Cybersecurity researchers from Workday’s Offensive Security team have uncovered a stealthy new technique that allows attackers to bypass Endpoint Detection and Response (EDR) systems by…

‘Grokking’: How Hackers Hijack Grok AI to Push Malware

By Abdul Wasay ⏐ 3 months ago ⏐ Newspaper Icon Newspaper Icon 2 min read

Cybercriminals are weaponizing X’s AI tool, Grok, to amplify malware campaigns by hiding malicious links in promoted ads, security researchers at Guardio Labs have found.…

Hackers Are Now Hiding Malware Inside AI Chatbot Images: Here’s How To Stay Safe

By Abdul Wasay ⏐ 3 months ago ⏐ Newspaper Icon Newspaper Icon 3 min read

A new category of cyberattack that bypasses traditional defenses has been uncovered by cybersecurity researchers at Trail of Bits. Malicious prompts are secretly embedded inside…

Get Alerts