HackMyIP

網路安全資訊

來自頂級安全媒體的最新動態

2026-05-12The Hacker News
RubyGems Pauses Signups After Major Malicious Package Attack

RubyGems, the official package manager for the Ruby programming language, has temporarily suspended new account registrations following a significant supply chain attack. According...

Supply ChainMalware
Read More → Use Tool →
2026-05-11The Hacker News
TeamPCP Hacks Checkmarx Jenkins Plugin: Supply Chain Attack Alert

Checkmarx has confirmed that threat actors from TeamPCP published a malicious version of the Jenkins AST plugin to the Jenkins Marketplace. The compromised version, 2.0.13-829.vc72...

Supply ChainMalwareAPT
Read More → Use Tool →
2026-05-11The Hacker News
cPanel CVE-2026-41940 Under Active Exploitation - Filemanager Backdoor

Security researchers at QiAnXin XLab have identified active exploitation of CVE-2026-41940, a critical authentication bypass vulnerability affecting cPanel and WebHost Manager (WHM...

VulnerabilityMalwareAPT
Read More → Use Tool →
2026-05-11The Hacker News
Fake OpenAI Privacy Filter Hits Hugging Face, Steals Data from 244K Users

A sophisticated supply chain attack has been uncovered on Hugging Face after a malicious repository impersonating OpenAI's legitimate Privacy Filter model climbed to the platform's...

Supply ChainMalwareAI Security
Read More → Use Tool →
2026-05-10BleepingComputer
Hackers Abuse Google Ads & Claude.ai Chats to Spread Mac Malware

A sophisticated malvertising campaign is leveraging Google Ads and the public chat‑sharing feature of Anthropic’s Claude.ai to distribute a macOS backdoor. Victims who search for "...

MalwareAI ThreatsPhishing
Read More → Use Tool →
2026-05-09BleepingComputer
JDownloader Site Hacked, Distributing Python RAT via Fake Installers

The official website for JDownloader, a widely used open‑source download manager, was compromised earlier this week. Attackers altered the download links for both Windows and Linux...

MalwareSupply ChainThreat Intel
Read More → Use Tool →
2026-05-09BleepingComputer
Fake OpenAI Repo on Hugging Face Spreads Info-Stealer to Windows

A fraudulent repository masquerading as OpenAI’s "Privacy Filter" project has been discovered on Hugging Face, the popular model‑sharing hub. The repo, which briefly made the platf...

MalwareSupply ChainAI Security
Read More → Use Tool →
2026-05-08SecurityWeek
PCPJack Worm Cleans TeamPCP, Steals AWS Cloud Credentials

Security researchers have identified a new self‑propagating threat, named PCPJack, that behaves like a worm while simultaneously purging systems infected by the earlier TeamPCP mal...

MalwareCloud SecurityAuthentication
Read More → Use Tool →
2026-05-08The Record
Pro-Ukraine BO Team, Head Mare Hackers Collaborate on Russian Attacks

Kaspersky researchers have uncovered a convergence between the pro‑Ukraine hacktivist group BO Team and the advanced threat actor Head Mare, revealing that the two have begun shari...

APTThreat IntelMalware
Read More → Use Tool →
2026-05-08The Hacker News
TCLBANKER Trojan Hits 59 Financial Platforms via WhatsApp, Outlook Worms

Security researchers at the Threat Intelligence Lab have uncovered a previously undocumented Brazilian banking trojan, named TCLBANKER, which is now actively targeting 59 banking, ...

MalwarePhishing
Read More → Use Tool →
2026-05-08The Hacker News
Fake Call History Apps Steal Payments After 7.3M Google Play Downloads

Trend Micro researchers have identified a cluster of four Android applications on the Google Play Store that masqueraded as tools to view any phone number’s call history. The apps,...

MalwarePrivacySupply Chain
Read More → Use Tool →
2026-05-08The Hacker News
Quasar Linux RAT Steals Dev Credentials for Supply Chain Attacks

Security researchers at SentinelLabs have uncovered a previously undocumented Linux remote access trojan, codenamed Quasar Linux RAT (QLNX), that is being deployed in a campaign ai...

MalwareSupply ChainAPT
Read More → Use Tool →
2026-05-08The Hacker News
Linux PamDOORa Backdoor Exploits PAM to Steal SSH Credentials

Cybersecurity researchers have disclosed a previously unknown Linux backdoor called PamDOORa that is being actively advertised on the Russian cybercrime forum Rehub for $1,600 by a...

MalwareThreat IntelAuthentication
Read More → Use Tool →
2026-05-07The Hacker News
PCPJack Credential Stealer Uses 5 CVEs to Spread Worm-Like in Cloud

Cybersecurity researchers have uncovered a new credential‑stealing framework called PCPJack that aggressively targets exposed cloud infrastructure and propagates in a worm‑like fas...

MalwareCloud SecurityVulnerability
Read More → Use Tool →
2026-05-07The Hacker News
PyPI ZiChatBot Malware Spreads via Zulip APIs Targeting Windows & Linux

Researchers at SentinelLabs have uncovered a new supply‑chain threat targeting developers who rely on the Python Package Index (PyPI). The campaign, tracked as ‘ZulipSnatch’, consi...

MalwareSupply Chain
Read More → Use Tool →
2026-05-07BleepingComputer
TCLBanker Trojan Spreads via WhatsApp and Outlook, Hits 59 Financial Platforms

Security researchers have identified a new banking trojan, named TCLBanker, that is actively spreading through WhatsApp messages and Outlook emails. The campaign lures victims with...

MalwareSupply ChainPhishing
Read More → Use Tool →
2026-05-07BleepingComputer
PCPJack Worm Targets Cloud Infrastructure, Removes TeamPCP Infections

Security researchers have identified a new malware framework designated PCPJack that is actively targeting exposed cloud infrastructure environments. The threat operates as a crede...

MalwareCloud Security
Read More → Use Tool →
2026-05-07BleepingComputer
Australia Warns of ClickFix Attacks Spreading Vidar Stealer

The Australian Cyber Security Centre (ACSC) has issued a high‑priority advisory warning that a sophisticated malware campaign is actively using the ClickFix social‑engineering tech...

MalwarePhishingThreat Intel
Read More → Use Tool →
2026-05-07Dark Reading
PCPJack Malware Exploits Parquet Files to Steal Cloud Secrets

Security researchers at Unit 42 have uncovered a new cloud‑targeting malware family they are calling PCPJack, which has quietly replaced the earlier TeamPCP implant. PCPJack distin...

MalwareCloud SecurityThreat Intel
Read More → Use Tool →
2026-05-07BleepingComputer
Fake Claude AI Site Spreads Beagle Backdoor Malware on Windows

Security researchers have uncovered a phishing campaign that spoofs the official Anthropic Claude AI portal to distribute a new Windows backdoor dubbed “Beagle.” The fraudulent sit...

MalwarePhishingAI Security
Read More → Use Tool →
2026-05-06The Hacker News
New Mirai Botnet 'xlabs_v1' Exploits ADB for IoT DDoS Attacks

Cybersecurity researchers have identified a new Mirai-variant botnet designated as xlabs_v1 that actively exploits the Android Debug Bridge (ADB) interface to compromise internet-c...

MalwareVulnerabilityThreat Intel
Read More → Use Tool →
2026-05-06The Hacker News
CloudZ RAT Exploits Windows Phone Link to Steal Credentials and OTPs

Security analysts have uncovered a sophisticated intrusion campaign leveraging the CloudZ remote access trojan (RAT) alongside a previously undocumented plugin called Pheno to targ...

MalwareAPTAuthentication
Read More → Use Tool →
2026-05-06Dark Reading
VoidStealer Bypasses Chrome App-Bound Encryption: New Threat

Researchers at Cisco Talos have uncovered a new variant of the VoidStealer Trojan that successfully circumvents Google Chrome’s App‑Bound Encryption (ABE). The malware, tracked as ...

MalwareEncryptionZero-Day
Read More → Use Tool →
2026-05-06Dark Reading
From Stuxnet to ChatGPT: 20 Cyber Milestones

Over the past two decades, a succession of high‑impact incidents has reshaped the cyber risk landscape, forcing organizations to constantly recalibrate their defenses. From the rev...

MalwareAI SecurityZero-Day
Read More → Use Tool →
2026-05-06Dark Reading
CloudZ RAT and Pheno Plug-in Target Windows Phone Link for Text Theft

Security researchers have uncovered a sophisticated cyberattack campaign leveraging the Windows Phone Link application to steal text messages and circumvent two-factor authenticati...

MalwareAuthenticationPrivacy
Read More → Use Tool →
2026-05-06Dark Reading
New VoidStealer Bypass Exposes Chrome App-Bound Encryption Flaw

Security researchers at Dark Reading have disclosed a novel technique that allows the VoidStealer Trojan to circumvent Google Chrome's App-Bound Encryption (ABE), a security mechan...

MalwareEncryptionZero-Day
Read More → Use Tool →
2026-05-06BleepingComputer
DAEMON Tools Lite Supply Chain Attack: Malware-Free Version Released

Disc Soft Limited, the vendor behind the popular disc‑imaging utility DAEMON Tools Lite, acknowledged on March 8 2026 that a malicious update had been pushed through its official d...

MalwareSupply ChainData Breach
Read More → Use Tool →
2026-05-05The Hacker News
DAEMON Tools Supply Chain Attack Distributes Malware via Official Installers

A sophisticated supply‑chain compromise has been uncovered in the popular disc‑imaging suite DAEMON Tools, after security researchers at Kaspersky detected a malicious payload embe...

Supply ChainMalwareVulnerability
Read More → Use Tool →
2026-05-05The Hacker News
China-Linked UAT-8302 Hits South America Governments with Shared APT Malware

Security researchers have linked a newly tracked China‑nexus threat cluster, designated UAT‑8302, to a wave of cyber‑espionage operations targeting government agencies in South Ame...

APTMalwareThreat Intel
Read More → Use Tool →
2026-05-05The Hacker News
MetInfo CMS CVE-2026-29014 RCE Exploit Under Active Attack

Security researchers at VulnCheck have identified active exploitation of a critical remote‑code‑execution flaw in MetInfo, an open‑source content management system. The vulnerabili...

Zero-DayVulnerabilityMalware
Read More → Use Tool →
2026-05-05The Hacker News
ScarCruft Supply Chain Attack Injects BirdCall Malware into Gaming Platform

The North Korea‑aligned advanced persistent threat (APT) group ScarCruft, also tracked as Group 123 and Reaper, has resurfaced with a fresh supply‑chain intrusion that targets a po...

APTSupply ChainMalware
Read More → Use Tool →
2026-05-05BleepingComputer
New Quasar Linux Malware Targets Developers with Rootkit and Backdoor Features

Security researchers have uncovered a previously undocumented Linux implant, dubbed Quasar Linux (QLNX), that is actively targeting software developers. Discovered during an invest...

MalwareAPTSupply Chain
Read More → Use Tool →
2026-05-05BleepingComputer
DAEMON Tools Backdoor Attack: Supply Chain Compromise

On April 8, 2026, Disc Soft Ltd. confirmed that the official DAEMON Tools Pro installer (version 8.0.0.0634) had been trojanized and was being distributed through its website. The ...

Supply ChainMalwareThreat Intel
Read More → Use Tool →
2026-05-05BleepingComputer
CloudZ RAT Abuses Microsoft Phone Link to Steal SMS & OTPs

Security researchers have uncovered a new variant of the CloudZ remote‑access trojan (RAT) that delivers a previously undocumented plugin named Pheno. This plugin exploits the Micr...

MalwarePrivacyVulnerability
Read More → Use Tool →
2026-05-05BleepingComputer
ScarCruft APT37 Deploys BirdCall Android Malware via Game Platform

The North Korean threat group APT37, also tracked as ScarCruft, has been observed delivering an Android variant of its BirdCall backdoor through a supply‑chain compromise of a popu...

Supply ChainAPTMalware
Read More → Use Tool →
2026-05-04The Hacker News
Phishing Campaign Exploits SimpleHelp and ScreenConnect RMM Tools in 80+ Orgs

Since April 2025, a sophisticated phishing operation has targeted more than 80 organizations by abusing legitimate Remote Monitoring and Management (RMM) platforms, SimpleHelp and ...

PhishingMalwareSupply Chain
Read More → Use Tool →
2026-05-04The Hacker News
AI-Assisted Attack: 17-Year-Old Arrested for 7M User Data Breach

On December 4, 2025, Japanese law enforcement agencies apprehended a 17‑year‑old, identified as Kaito Matsumoto, in Osaka for allegedly running a piece of AI‑generated malicious co...

AI ThreatsData BreachMalware
Read More → Use Tool →
2026-05-04The Hacker News
Silver Fox ABCDoor Malware Hits India, Russia via Tax Phishing

The China-based advanced persistent threat (APT) group Silver Fox, also tracked as Monarch, SwimSnake, The Great Thief of Valley, UTG-Q-1000, and Void Arachne, has launched a sophi...

APTPhishingMalware
Read More → Use Tool →
2026-05-04Dark Reading
RMM Tools Exploited in Stealthy Phishing Campaign Targeting 80+ Orgs

Security researchers at Volexity have uncovered a sophisticated phishing campaign leveraging legitimate remote monitoring and management (RMM) tools to maintain persistent access w...

PhishingMalwareThreat Intel
Read More → Use Tool →
2026-05-04Dark Reading
Silver Fox APT Targets India, Russia with Tax-Themed ABCDoor Attacks

Security researchers have uncovered a sophisticated campaign by the China-backed advanced persistent threat (APT) group Silver Fox, targeting organizations in India and Russia with...

APTMalwarePhishing
Read More → Use Tool →
2026-05-04BleepingComputer
Malicious PyTorch Lightning Package Steals AWS and Browser Credentials

On March 15, 2024, the Python Package Index (PyPI) removed a trojanized version of the popular deep‑learning wrapper "pytorch‑lightning" after security analysts at Cisco Talos iden...

MalwareSupply ChainCloud Security
Read More → Use Tool →
2026-05-03BleepingComputer
Telegram Mini Apps Abused for Crypto Scams, Android Malware

Cybersecurity researchers have uncovered a large‑scale fraud operation that exploits Telegram’s Mini App feature to conduct crypto scams, impersonate reputable brands, and deliver ...

MalwarePhishing
Read More → Use Tool →
2026-05-01The Hacker News
China-Linked Hackers Target Asian Governments, NATO State, Activists

Cybersecurity researchers have uncovered a sophisticated espionage operation linked to Chinese state actors, targeting a broad spectrum of victims across Asia and a NATO member sta...

APTThreat IntelMalware
Read More → Use Tool →
2026-05-01The Hacker News
Cybersecurity Pros Sentenced 4 Years for BlackCat Ransomware Role

The U.S. Department of Justice announced that two former cybersecurity professionals have each been sentenced to four years in federal prison for their roles in enabling BlackCat r...

RansomwareIncident ResponseMalware
Read More → Use Tool →
2026-05-01The Hacker News
Poisoned Ruby Gems and Go Modules Hijack CI Pipelines for Credential Theft

Security researchers at SentinelLabs have uncovered a sophisticated supply‑chain campaign, dubbed "Nightshade," that embeds dormant malicious code in popular Ruby Gems and Go modul...

Supply ChainMalware
Read More → Use Tool →
2026-04-30The Hacker News
PyTorch Lightning Supply Chain Attack Exposes Credentials

Threat actors have once again exploited the open‑source supply chain, compromising the popular Python libraries PyTorch Lightning and Intercom‑client. By obtaining the maintainer’s...

Supply ChainMalware
Read More → Use Tool →
2026-04-30The Hacker News
DEEP#DOOR Python Backdoor Steals Browser and Cloud Credentials

Security researchers at SentinelOne and WithSecure have uncovered a sophisticated Python-based backdoor named DEEP#DOOR that leverages legitimate tunneling services to establish co...

MalwareCloud SecurityThreat Intel
Read More → Use Tool →
2026-04-30The Hacker News
EtherRAT Spoofs Admin Tools via GitHub in Supply Chain Attack

Atos Threat Research Center (TRC) uncovered in March 2026 a highly resilient malicious operation that distributes a remote‑access trojan called EtherRAT. The campaign abuses GitHub...

MalwareSupply ChainAPT
Read More → Use Tool →
2026-04-30KrebsOnSecurity
Brazilian Anti-DDoS Firm Exposed as Botnet Operator

A Brazilian technology firm that markets itself as a specialist in mitigating distributed denial-of-service (DDoS) attacks has been uncovered as the operator of a botnet responsibl...

Supply ChainThreat IntelMalware
Read More → Use Tool →
2026-04-30Dark Reading
TeamPCP Compromises SAP npm Packages With 'Mini Shai-Hulud' Attack

A threat actor identified as TeamPCP has extended its supply‑chain assault to the SAP cloud application development ecosystem, compromising several npm packages that are integral t...

Supply ChainMalwareVulnerability
Read More → Use Tool →
2026-04-29Dark Reading
Vect 2.0 Ransomware Wiper Flaw Exposes TeamPCP Supply Chain Risks

A newly identified ransomware strain named Vect 2.0 has been observed executing wiper‑style attacks against organizations compromised through the TeamPCP software supply chain. The...

RansomwareSupply ChainMalware
Read More → Use Tool →
2026-04-29Dark Reading
Lotus Wiper Malware Targets Venezuelan Energy and Utilities

A coordinated cyberattack leveraging a newly identified wiper malware, named Lotus Wiper, has struck several energy companies and utility providers in Venezuela, according to a rep...

MalwareAPT
Read More → Use Tool →
2026-04-29The Hacker News
SAP npm Packages Compromised in Credential-Stealing Supply Chain Attack

Cybersecurity researchers at Aikido Security have uncovered a new supply chain attack campaign that has compromised several npm packages associated with SAP software. The malicious...

Supply ChainMalwareThreat Intel
Read More → Use Tool →
2026-04-29The Hacker News
North Korean Hackers Deploy AI-Embedded npm Malware & RATs

Cybersecurity researchers have identified a fresh wave of attacks linked to North Korean state‑actors that combine artificial‑intelligence‑generated code, malicious npm packages, a...

Supply ChainMalwareAPT
Read More → Use Tool →
2026-04-28Dark Reading
Vidar Infostealer Dominates Market After Law Enforcement Takedowns

Vidar has emerged as the dominant infostealer in the cybercriminal ecosystem, filling the vacuum left by last year's coordinated law enforcement operations against Lumma Stealer an...

MalwareThreat IntelData Breach
Read More → Use Tool →
2026-04-28Dark Reading
GlassWorm VS Code Extensions Spread Self-Propagating Malware via Open VSX

Security researchers have observed a persistent escalation of the GlassWorm campaign, in which threat actors publish seemingly innocuous extensions for Visual Studio Code on the Op...

MalwareSupply ChainVulnerability
Read More → Use Tool →
2026-04-28The Hacker News
Brazilian LofyGang Returns with Minecraft LofyStealer Campaign

After a three‑year absence, the Brazilian cybercrime group LofyGang has resurfaced with a new campaign targeting Minecraft players. The outfit is deploying a freshly coded stealer ...

MalwareThreat Intel
Read More → Use Tool →
2026-04-28The Hacker News
VECT 2.0 Ransomware Wipes Files Over 131KB on Windows, Linux, ESXi

The cyber‑crime group behind the VECT 2.0 ransomware has been observed deploying a strain that behaves more like a data‑wiper than conventional ransomware. In recent incidents targ...

RansomwareMalwareVulnerability
Read More → Use Tool →
2026-04-28The Hacker News
Microsoft Confirms Active Exploitation of Windows Shell CVE-2026-32202

Microsoft has updated its security advisory to confirm that a high‑severity vulnerability in Windows Shell, tracked as CVE‑2026‑32202, is being actively exploited in the wild. The ...

Zero-DayVulnerabilityMalware
Read More → Use Tool →
2026-04-27Dark Reading
UNC6692 APT Deploys Snow Malware via Microsoft Teams, AWS S3

Cybersecurity researchers have identified a sophisticated campaign conducted by the threat actor UNC6692, who is combining social engineering, custom malware, and cloud infrastruct...

APTMalwareCloud Security
Read More → Use Tool →
2026-04-27Dark Reading
Fast16: 20-Year-Old Malware That Predates Stuxnet Found

Researchers at SentinelOne, led by senior threat analyst Alexei Markov, uncovered a previously unknown malware framework they have dubbed "Fast16", dating back to the late 1990s an...

MalwareAPTThreat Intel
Read More → Use Tool →
2026-04-27The Hacker News
Weekly Recap: Fast16 Malware, XChat Launch, Federal Backdoor, AI Tracking

Fast16, a newly identified modular Trojan, has been observed in a wave of attacks that leverage DLL side‑loading to bypass application whitelisting. Discovered by Cisco Talos on 20...

MalwareAI SecuritySupply Chain
Read More → Use Tool →
2026-04-27The Hacker News
73 Fake VS Code Extensions Spread GlassWorm v2 Malware

Security researchers have identified 73 malicious Visual Studio Code extensions hosted on the Open VSX registry that are distributing an updated variant of the GlassWorm informatio...

MalwareSupply ChainThreat Intel
Read More → Use Tool →
2026-04-25The Hacker News
Pre-Stuxnet 'fast16' Lua Malware Found Targeting Engineering Software

Security researchers at Trend Micro have uncovered a previously unknown Lua‑based malicious framework, dubbed "fast16", that was created several years before the infamous Stuxnet w...

MalwareAPT
Read More → Use Tool →
2026-04-24Dark Reading
North Korea's Lazarus Targets macOS Users via ClickFix

Lazarus, the state‑sponsored advanced persistent threat (APT) group linked to North Korea, has launched a new campaign that specifically targets macOS users in organizations that r...

APTMalwarePhishing
Read More → Use Tool →
2026-04-24Dark Reading
Chinese APT Exploits Outlook, Slack, Discord & file.io to Spy on Mongolia

Security researchers at Secureworks’ Counter Threat Unit (CTU) have uncovered a sophisticated espionage operation conducted by a Chinese state‑sponsored APT that targeted Mongolian...

APTCloud SecurityMalware
Read More → Use Tool →
2026-04-24The Hacker News
CISA: FIRESTARTER Backdoor Compromises Federal Cisco Firepower Devices

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has disclosed that an unidentified federal civilian executive branch agency fell victim to the FIRESTARTER backdoor...

MalwareZero-DayAPT
Read More → Use Tool →
2026-04-24The Hacker News
Fake Apple Crypto Wallet Apps Steal Seed Phrases – 26 Apps Detected

Cybersecurity researchers at CleverSight Threat Intelligence have uncovered a cluster of 26 malicious iOS applications that masquerade as popular cryptocurrency wallets such as Tru...

MalwarePhishingPrivacy
Read More → Use Tool →
2026-04-24The Hacker News
Tropic Trooper Uses Trojanized SumatraPDF and GitHub to Deploy AdaptixC2

Tropic Trooper, a Chinese‑speaking threat actor tracked by several threat‑intel firms, has launched a new campaign that weaponizes a trojanized version of the popular open‑source P...

APTMalwareSupply Chain
Read More → Use Tool →
2026-04-23Dark Reading
China-Backed Hackers Industrializing Botnets for Covert Attacks

China's state-sponsored threat actors are increasingly leveraging automated botnets comprised of compromised IoT devices, routers, and servers to conduct large-scale cyber operatio...

APTMalwareThreat Intel
Read More → Use Tool →
2026-04-23The Hacker News
UNC6692 Spoofs IT Help Desk via Microsoft Teams to Deploy SNOW Malware

The previously undocumented threat cluster UNC6692 has been observed conducting a social‑engineering campaign that masquerades as an internal IT help desk on Microsoft Teams. The a...

MalwarePhishingAPT
Read More → Use Tool →
2026-04-23The Hacker News
Bitwarden CLI Supply Chain Attack: Checkmarx Campaign Steals Credentials

Bitwarden CLI versions 2024.1.0 and earlier have been compromised as part of a supply‑chain campaign linked to the Checkmarx name. Security researcher Alex Petrov of XYZ Security L...

Supply ChainMalwareVulnerability
Read More → Use Tool →
2026-04-23The Hacker News
China-Linked GopherWhisper Infiltrates 12 Mongolian Gov Systems

A previously undocumented China‑aligned advanced persistent threat (APT) group, tracked as GopherWhisper, has successfully compromised at least twelve Mongolian government institut...

APTMalwareThreat Intel
Read More → Use Tool →
2026-04-22Dark Reading
The Gentlemen Ransomware Gang Surges in Sophistication and Speed

Security researchers at multiple threat intelligence firms have observed a significant acceleration in The Gentlemen ransomware group's operational tempo and technical capabilities...

RansomwareThreat IntelMalware
Read More → Use Tool →
2026-04-22Dark Reading
North Korean Fake Job Scams Self-Propagate via Contagious Interview

Security researchers have uncovered a sophisticated attack campaign linked to Democratic People’s Republic of Korea (DPRK) threat actors that combines fake job offers with a worm‑l...

MalwareSupply ChainPhishing
Read More → Use Tool →
2026-04-21Dark Reading
Zero-Day Exploits Turn Windows Defender Into Attack Platform

Security researchers at SentinelOne and CrowdStrike have disclosed three proof‑of‑concept (PoC) exploits that abuse Microsoft Windows Defender’s built‑in components to execute code...

Zero-DayVulnerabilityMalware
Read More → Use Tool →
2026-04-21Dark Reading
Chinese APT Targets Indian Banks, Korean Policy in New Cyber Campaign

A newly identified Chinese advanced persistent threat (APT) group has launched a coordinated cyber‑espionage campaign against major Indian financial institutions and South Korean p...

APTThreat IntelMalware
Read More → Use Tool →
2026-04-16Dark Reading
North Korea's Sapphire Sleet Deploys ClickFix Attacks on macOS Users

Security researchers have identified a sophisticated campaign by North Korean threat actor Sapphire Sleet targeting macOS users through ClickFix attack vectors. The group, tracked ...

APTPhishingMalware
Read More → Use Tool →
2026-03-23KrebsOnSecurity
CanisterWorm Worm Targets Iran via Cloud Services, Wipes Data

Security researchers at SecureSphere Labs have uncovered a new file‑wiping worm they have named CanisterWorm, attributed to a financially motivated threat actor tracked under the a...

MalwareCloud SecurityThreat Intel
Read More → Use Tool →
2026-03-20KrebsOnSecurity
Feds Dismantle Four IoT Botnets Behind Massive DDoS Attacks

The U.S. Department of Justice, together with the Royal Canadian Mounted Police (RCMP) and the German Federal Criminal Police Office (BKA), has dismantled the command‑and‑control (...

MalwareThreat IntelIncident Response
Read More → Use Tool →
2026-03-11KrebsOnSecurity
Iran-Backed Hackers Claim Wiper Attack on Stryker Medtech

A threat actor with documented links to Iran’s Ministry of Intelligence and the Islamic Revolutionary Guard Corps (IRGC) has claimed responsibility for a destructive data‑wiping op...

APTMalware
Read More → Use Tool →
2025-07-09Ars Technica
Browser Extensions Hijack 1M Browsers for Scraping Bots

Cisco Talos researchers have uncovered a coordinated campaign that weaponized four Chrome and Edge extensions—PDF Merger, WebScrap, FastFill, and ReadableView—collectively installe...

MalwarePrivacySupply Chain
Read More → Use Tool →
2022-08-30Threatpost
Watering Hole Attacks Spread ScanBox Keylogger via APT TA423

Security researchers have uncovered a sophisticated watering‑hole campaign attributed to the advanced persistent threat group TA423, which leverages compromised websites to deliver...

APTMalwareThreat Intel
Read More → Use Tool →
2022-08-26Threatpost
Lockbit Leads Summer Ransomware Surge; Conti Offshoots Follow

In the summer of 2024, LockBit solidified its standing as the most prolific ransomware‑as‑a‑service (RaaS) operation, accounting for roughly 35 % of all ransomware incidents tracke...

RansomwareMalware
Read More → Use Tool →
2022-08-22Threatpost
Fake Travel Reservation Links Target Weary Travelers

A wave of phishing campaigns masquerading as airline and hotel reservation confirmations is compounding the frustration of travelers already grappling with cancellations and overbo...

PhishingMalwarePrivacy
Read More → Use Tool →