PromptLock: First Ever AI-Powered Ransomware Emerges

By Abdul Wasay ⏐ 3 months ago ⏐ Newspaper Icon Newspaper Icon 2 min read

Security researchers at ESET have revealed what may be the world’s first AI powered ransomware, dubbed PromptLock. This alarming proof of concept leverages OpenAI’s gpt…

New Android Malware Can Now Evolve into Banking Ransomware Trojan

By Abdul Wasay ⏐ 3 months ago ⏐ Newspaper Icon Newspaper Icon 3 min read

Android users are facing a significant cybersecurity threat as the notorious HOOK banking trojan has evolved into a more sophisticated and dangerous variant. Known as…

Cyber Spies Exploit KorPlug Malware with Stealthy DLL Obfuscation

By Abdul Wasay ⏐ 3 months ago ⏐ Newspaper Icon Newspaper Icon 2 min read

A high-caliber Remote Access Trojan (RAT) known as KorPlug Malware has officially been unmasked, and the revelations are chilling. Security researchers at RevEng.AI have uncovered…

A New Malware Tricks People Into Clicking on Fake ChatGPT Apps

By Abdul Wasay ⏐ 4 months ago ⏐ Newspaper Icon Newspaper Icon 3 min read

Cybercriminals have found a new way to poison trust: by dressing up sophisticated malware as a friendly “ChatGPT desktop app.” Microsoft has now raised the…

Android NFC Malware ‘PhantomCard’ Hijacks Contactless Payments, Banks Warn

By Abdul Wasay ⏐ 4 months ago ⏐ Newspaper Icon Newspaper Icon 2 min read

Cybersecurity researchers have uncovered a sophisticated Android banking Trojan named PhantomCard, capable of hijacking contactless payments. Disguised as a card protection app, it tricks users…

WinRAR Hit by Zero-Day Exploit That Plants Malware at Windows Startup

By Abdul Wasay ⏐ 4 months ago ⏐ Newspaper Icon Newspaper Icon 2 min read

A dangerous security flaw in WinRAR is wreaking havoc in the wild. Experts say Windows users should be on high alert and do preventive actions…

Hackers Exploit Critical WordPress Theme Flaw Worldwide

By Abdul Wasay ⏐ 4 months ago ⏐ Newspaper Icon Newspaper Icon 3 min read

A critical RCE vulnerability (CVE‑2025‑5394) in versions 7.8.3 and earlier of the Alone Charity Multipurpose WordPress Theme is actively exploited. Over 120,000 attempts were recorded…

Hackers Exploit YouTube, Discord to Deploy Info-Stealing Malware

By Abdul Wasay ⏐ 4 months ago ⏐ Newspaper Icon Newspaper Icon 2 min read

A sophisticated new YouTube Discord malware campaign is making waves in the cybersecurity world. Threat actors are now leveraging the combined power of YouTube and…

Russian Hackers Now Using AI to Target Government Officials in Real Time

By Abdul Wasay ⏐ 4 months ago ⏐ Newspaper Icon Newspaper Icon 2 min read

Ukraine’s CERT UA has flagged a sophisticated Russian malware strain called LameHug malware, engineered by state backed APT28. This emerging threat uses a LLMs to…

Gmail Users at Risk From Gemini‑Powered Scam—Protect Yourself Now

By Abdul Wasay ⏐ 4 months ago ⏐ Newspaper Icon Newspaper Icon 2 min read

Cybercriminals are exploiting Gemini AI to scam Gmail users. The exploit tactics goes on to trick users into handing over passwords. The attack embeds invisible…

Hackers Exploit DNS Blind Spot to Hide Stealthy Malware

By Abdul Wasay ⏐ 5 months ago ⏐ Newspaper Icon Newspaper Icon 2 min read

In a newly discovered cyberattack technique, threat actors are exploiting DNS records to hide malware and bypass most detection systems. The method allows hackers to…

NVIDIA GPUs Are Getting Destroyed By Rowhammer Exploit

By Abdul Wasay ⏐ 5 months ago ⏐ Newspaper Icon Newspaper Icon 3 min read

Nvidia’s flagship RTX A6000 GPU has just become the first graphics processor confirmed vulnerable to Rowhammer attacks, sparking serious concerns for AI developers and enterprise…

This Open-Source Malware Has Turned Into A Global Cyber Threat (And You Should Be Worried)

By Abdul Wasay ⏐ 5 months ago ⏐ Newspaper Icon Newspaper Icon 3 min read

What began as a simple GitHub project in 2019 has quietly morphed into an open-source malware pushing modern cybersecurity measures. AsyncRAT, the C#-based remote access…

Get Alerts