#malware

[ follow ]
#npm
fromTheregister
5 days ago

Toptal caught serving malware after GitHub compromise

Toptal's systems were compromised, distributing malware through developer accounts affecting around 5,000 users.
#cyber-espionage
Cryptocurrency
fromThe Hacker News
6 days ago

Soco404 and Koske Malware Target Cloud Services with Cross-Platform Cryptomining Attacks

Two malware campaigns, Soco404 and Koske, exploit cloud vulnerabilities to deliver cryptocurrency miners.
#phishing
#cybersecurity
Privacy professionals
fromThe Hacker News
1 week ago

Credential Theft and Remote Access Surge as AllaKore, PureRAT, and Hijack Loader Proliferate

Mexican organizations are targeted by Greedy Sponge for modified AllaKore RAT and SystemBC in a financially motivated campaign.
#coyote-trojan
#cybercrime
fromArs Technica
1 week ago
US politics

Ukrainians arrest alleged admin of major crime forum XSS

Ukrainian authorities arrested the suspected administrator of the Russian-language crime forum XSS.is, a key player in global cybercrime.
fromTheregister
1 month ago
Growth hacking

Crooks posing as job hunters to malware-infect recruiters

Cybercriminals are targeting recruiters by posing as job seekers on LinkedIn and Indeed, delivering malware via fake resume portfolios.
fromThe Hacker News
1 week ago

Critical Unpatched SharePoint Zero-Day Actively Exploited, Breaches 75+ Global Organizations

A critical security vulnerability in Microsoft SharePoint Server, tracked as CVE-2025-53770 with a CVSS score of 9.8, has been weaponized in a large-scale exploitation campaign.
Information security
#android
fromThe Hacker News
1 week ago

Google Sues 25 Chinese Entities Over BADBOX 2.0 Botnet Affecting 10M Android Devices

"The BADBOX 2.0 botnet compromised over 10 million uncertified devices running Android's open-source software (Android Open Source Project), which lacks Google's security protections."
Privacy professionals
#sonicwall
fromBleepingComputer
2 weeks ago

North Korean XORIndex malware hidden in 67 malicious npm packages

North Korean threat actors delivered malware through 67 malicious npm packages, affecting over 17,000 downloads.
#macos
fromThe Hacker News
2 weeks ago

New PHP-Based Interlock RAT Variant Uses FileFix Delivery Mechanism to Target Multiple Industries

Since May 2025, activity related to the Interlock RAT has been observed in connection with the LandUpdate808 (aka KongTuke) web-inject threat clusters.
Privacy technologies
Information security
fromThe Hacker News
3 weeks ago

Hackers Use Leaked Shellter Tool License to Spread Lumma Stealer and SectopRAT Malware

Hackers are exploiting Shellter, a red teaming tool, for malfeasance, distributing stealer malware following a leaked version.
fromIT Pro
3 weeks ago

Malware as a service explained: What it is and why businesses should take note

MaaS enables low-skilled criminals to easily access sophisticated cyberattack tools, contributing to a surge in cyber threats.
Information security
fromThe Hacker News
3 weeks ago

Researchers Uncover Batavia Windows Spyware Stealing Documents from Russian Firms

Russian organizations are being targeted by a campaign using new spyware called Batavia to steal sensitive internal documents.
fromHackernoon
4 months ago

AI Slopsquatting: How LLM Hallucinations Poison Your Code | HackerNoon

AI slopsquatting is a serious threat where fake package names suggested by AI lead to malware infections.
fromTechzine Global
4 weeks ago

Malware campaign targets Web3 and crypto platforms

North Korean threat actors are using Nim-compiled malware, named NimDoor, to compromise Web3 and cryptocurrency organizations.
fromThe Hacker News
1 month ago

GIFTEDCROOK Malware Evolves: From Browser Stealer to Intelligence-Gathering Tool

GIFTEDCROOK malware has evolved into a complex intelligence-gathering tool targeting sensitive documents and browser data from individuals, particularly within Ukraine.
fromZDNET
1 month ago

You should probably delete any sensitive screenshots you have in your phone right now. Here's why

It's generally not a good idea to keep screenshots of sensitive information on your phone, but you should probably delete them, especially if they're related to your crypto wallet.
Privacy technologies
fromElectronic Frontier Foundation
1 month ago

FBI Warning on IoT Devices: How to Tell If You Are Impacted

Innocent IoT devices can be compromised to facilitate criminal activity, posing risks to owners and requiring consumer awareness and vigilance.
fromThe Hacker News
1 month ago

1,500+ Minecraft Players Infected by Java Malware Masquerading as Game Mods on GitHub

A multi-stage malware campaign is targeting Minecraft users through a Java-based malware exploiting a distribution-as-service framework.
Bootstrapping
fromZDNET
1 month ago

Install this Windows PC update ASAP before bootkit malware takes over - here's how

Windows users must install June updates to fix a serious Secure Boot vulnerability that could allow attackers to control PCs.
fromIT Pro
1 month ago

FIN6 attackers target recruiters with fraudulent resumes

FIN6 group exploits job seeker impersonation to deliver malware through phishing links on professional job sites.
[ Load more ]