Android NFC Malware ‘PhantomCard’ Hijacks Contactless Payments, Banks Warn

By Abdul Wasay ⏐ 6 months ago ⏐ Newspaper Icon 2 min read

Cybersecurity researchers have uncovered a sophisticated Android banking Trojan named PhantomCard, capable of hijacking contactless payments. Disguised as a card protection app, it tricks users…

WinRAR Hit by Zero-Day Exploit That Plants Malware at Windows Startup

By Abdul Wasay ⏐ 6 months ago ⏐ Newspaper Icon 2 min read

A dangerous security flaw in WinRAR is wreaking havoc in the wild. Experts say Windows users should be on high alert and do preventive actions…

Hackers Exploit Critical WordPress Theme Flaw Worldwide

By Abdul Wasay ⏐ 6 months ago ⏐ Newspaper Icon 3 min read

A critical RCE vulnerability (CVE‑2025‑5394) in versions 7.8.3 and earlier of the Alone Charity Multipurpose WordPress Theme is actively exploited. Over 120,000 attempts were recorded…

Hackers Exploit YouTube, Discord to Deploy Info-Stealing Malware

By Abdul Wasay ⏐ 6 months ago ⏐ Newspaper Icon 2 min read

A sophisticated new YouTube Discord malware campaign is making waves in the cybersecurity world. Threat actors are now leveraging the combined power of YouTube and…

Russian Hackers Now Using AI to Target Government Officials in Real Time

By Abdul Wasay ⏐ 6 months ago ⏐ Newspaper Icon 2 min read

Ukraine’s CERT UA has flagged a sophisticated Russian malware strain called LameHug malware, engineered by state backed APT28. This emerging threat uses a LLMs to…

Gmail Users at Risk From Gemini‑Powered Scam—Protect Yourself Now

By Abdul Wasay ⏐ 6 months ago ⏐ Newspaper Icon 2 min read

Cybercriminals are exploiting Gemini AI to scam Gmail users. The exploit tactics goes on to trick users into handing over passwords. The attack embeds invisible…

Hackers Exploit DNS Blind Spot to Hide Stealthy Malware

By Abdul Wasay ⏐ 6 months ago ⏐ Newspaper Icon 2 min read

In a newly discovered cyberattack technique, threat actors are exploiting DNS records to hide malware and bypass most detection systems. The method allows hackers to…

NVIDIA GPUs Are Getting Destroyed By Rowhammer Exploit

By Abdul Wasay ⏐ 7 months ago ⏐ Newspaper Icon 3 min read

Nvidia’s flagship RTX A6000 GPU has just become the first graphics processor confirmed vulnerable to Rowhammer attacks, sparking serious concerns for AI developers and enterprise…

This Open-Source Malware Has Turned Into A Global Cyber Threat (And You Should Be Worried)

By Abdul Wasay ⏐ 7 months ago ⏐ Newspaper Icon 3 min read

What began as a simple GitHub project in 2019 has quietly morphed into an open-source malware pushing modern cybersecurity measures. AsyncRAT, the C#-based remote access…

Millions at Risk as Gravity Forms WordPress Plugin Gets Backdoored

By Abdul Wasay ⏐ 7 months ago ⏐ Newspaper Icon 2 min read

Patchstack has identified a critical supply chain attack targeting Gravity Forms, one of WordPress’s most widely used premium plugins. Ironically, this plug-in is installed on…

Hackers Are Now Deploying Stealthy Remcos Malware via Windows

By Abdul Wasay ⏐ 7 months ago ⏐ Newspaper Icon 2 min read

As if we could catch a break, a new cyber threat nicknamed Remcos Malware is quietly taking hold of Windows users with alarming precision. Hackers…

Critical Android Flaw Could Trick Users into Malware Downloads

By Abdul Wasay ⏐ 7 months ago ⏐ Newspaper Icon 3 min read

Security researchers have uncovered a critical Android flaw that lets cybercriminals insert hidden Unicode characters into app notifications. These invisible characters allow attackers to disguise…

Get Alerts