Malware Alert
Android NFC Malware ‘PhantomCard’ Hijacks Contactless Payments, Banks Warn
Cybersecurity researchers have uncovered a sophisticated Android banking Trojan named PhantomCard, capable of hijacking contactless payments. Disguised as a card protection app, it tricks users…
WinRAR Hit by Zero-Day Exploit That Plants Malware at Windows Startup
A dangerous security flaw in WinRAR is wreaking havoc in the wild. Experts say Windows users should be on high alert and do preventive actions…
Hackers Exploit Critical WordPress Theme Flaw Worldwide
A critical RCE vulnerability (CVE‑2025‑5394) in versions 7.8.3 and earlier of the Alone Charity Multipurpose WordPress Theme is actively exploited. Over 120,000 attempts were recorded…
Hackers Exploit YouTube, Discord to Deploy Info-Stealing Malware
A sophisticated new YouTube Discord malware campaign is making waves in the cybersecurity world. Threat actors are now leveraging the combined power of YouTube and…
Russian Hackers Now Using AI to Target Government Officials in Real Time
Ukraine’s CERT UA has flagged a sophisticated Russian malware strain called LameHug malware, engineered by state backed APT28. This emerging threat uses a LLMs to…
Gmail Users at Risk From Gemini‑Powered Scam—Protect Yourself Now
Cybercriminals are exploiting Gemini AI to scam Gmail users. The exploit tactics goes on to trick users into handing over passwords. The attack embeds invisible…
Hackers Exploit DNS Blind Spot to Hide Stealthy Malware
In a newly discovered cyberattack technique, threat actors are exploiting DNS records to hide malware and bypass most detection systems. The method allows hackers to…
NVIDIA GPUs Are Getting Destroyed By Rowhammer Exploit
Nvidia’s flagship RTX A6000 GPU has just become the first graphics processor confirmed vulnerable to Rowhammer attacks, sparking serious concerns for AI developers and enterprise…
This Open-Source Malware Has Turned Into A Global Cyber Threat (And You Should Be Worried)
What began as a simple GitHub project in 2019 has quietly morphed into an open-source malware pushing modern cybersecurity measures. AsyncRAT, the C#-based remote access…
Millions at Risk as Gravity Forms WordPress Plugin Gets Backdoored
Patchstack has identified a critical supply chain attack targeting Gravity Forms, one of WordPress’s most widely used premium plugins. Ironically, this plug-in is installed on…
Hackers Are Now Deploying Stealthy Remcos Malware via Windows
As if we could catch a break, a new cyber threat nicknamed Remcos Malware is quietly taking hold of Windows users with alarming precision. Hackers…
Critical Android Flaw Could Trick Users into Malware Downloads
Security researchers have uncovered a critical Android flaw that lets cybercriminals insert hidden Unicode characters into app notifications. These invisible characters allow attackers to disguise…