New Android Malware Can Now Evolve into Banking Ransomware Trojan

3 min read

Android users are facing a significant cybersecurity threat as the notorious HOOK banking trojan has evolved into a more sophisticated and dangerous variant. Known as…

Cyber Spies Exploit KorPlug Malware with Stealthy DLL Obfuscation

2 min read

A high-caliber Remote Access Trojan (RAT) known as KorPlug Malware has officially been unmasked, and the revelations are chilling. Security researchers at RevEng.AI have uncovered…

A New Malware Tricks People Into Clicking on Fake ChatGPT Apps

3 min read

Cybercriminals have found a new way to poison trust: by dressing up sophisticated malware as a friendly “ChatGPT desktop app.” Microsoft has now raised the…

Android NFC Malware ‘PhantomCard’ Hijacks Contactless Payments, Banks Warn

2 min read

Cybersecurity researchers have uncovered a sophisticated Android banking Trojan named PhantomCard, capable of hijacking contactless payments. Disguised as a card protection app, it tricks users…

WinRAR Hit by Zero-Day Exploit That Plants Malware at Windows Startup

2 min read

A dangerous security flaw in WinRAR is wreaking havoc in the wild. Experts say Windows users should be on high alert and do preventive actions…

Hackers Exploit Critical WordPress Theme Flaw Worldwide

3 min read

A critical RCE vulnerability (CVE‑2025‑5394) in versions 7.8.3 and earlier of the Alone Charity Multipurpose WordPress Theme is actively exploited. Over 120,000 attempts were recorded…

Hackers Exploit YouTube, Discord to Deploy Info-Stealing Malware

2 min read

A sophisticated new YouTube Discord malware campaign is making waves in the cybersecurity world. Threat actors are now leveraging the combined power of YouTube and…

Russian Hackers Now Using AI to Target Government Officials in Real Time

2 min read

Ukraine’s CERT UA has flagged a sophisticated Russian malware strain called LameHug malware, engineered by state backed APT28. This emerging threat uses a LLMs to…

Gmail Users at Risk From Gemini‑Powered Scam—Protect Yourself Now

2 min read

Cybercriminals are exploiting Gemini AI to scam Gmail users. The exploit tactics goes on to trick users into handing over passwords. The attack embeds invisible…

Hackers Exploit DNS Blind Spot to Hide Stealthy Malware

2 min read

In a newly discovered cyberattack technique, threat actors are exploiting DNS records to hide malware and bypass most detection systems. The method allows hackers to…

NVIDIA GPUs Are Getting Destroyed By Rowhammer Exploit

3 min read

Nvidia’s flagship RTX A6000 GPU has just become the first graphics processor confirmed vulnerable to Rowhammer attacks, sparking serious concerns for AI developers and enterprise…

This Open-Source Malware Has Turned Into A Global Cyber Threat (And You Should Be Worried)

3 min read

What began as a simple GitHub project in 2019 has quietly morphed into an open-source malware pushing modern cybersecurity measures. AsyncRAT, the C#-based remote access…

Millions at Risk as Gravity Forms WordPress Plugin Gets Backdoored

2 min read

Patchstack has identified a critical supply chain attack targeting Gravity Forms, one of WordPress’s most widely used premium plugins. Ironically, this plug-in is installed on…

Get Alerts