All posts tagged "Malware"
-
Security
/ 2 months agoHackers Target Central Asian Telecoms with New Backdoors
A cybersecurity threat group known as UnsolicitedBooker has shifted its focus to telecommunications providers in Central Asia, deploying previously unseen malware...
-
Security
/ 2 months agoCybersecurity Threats Escalate with Skimmers, AI, and DDoS Attacks
cybersecurity threats escalated globally this week, with significant incidents targeting payment systems, artificial intelligence platforms, and critical internet infrastructure. Security researchers...
-
Security
/ 2 months agoWormable XMRig Campaign Uses BYOVD and Logic Bomb
<a href="https://delimiter.online/blog/apt28-webhook-malware/” title=”cybersecurity”>cybersecurity researchers have disclosed a new, sophisticated cryptojacking campaign that uses pirated software as a lure. The operation deploys...
-
Security
/ 2 months agoIranian Hackers Target MENA with New Malware Campaign
A state-sponsored Iranian hacking group has launched a new cyber espionage campaign targeting organizations and individuals across the Middle East and...
-
Security
/ 2 months agoClickFix Campaign Uses Hacked Sites to Spread MIMICRAT Malware
cybersecurity researchers have uncovered a sophisticated malware distribution campaign, dubbed ClickFix, that is leveraging compromised legitimate websites to deploy a previously...
-
Security
/ 2 months agoCRESCENTHARVEST Campaign Deploys RAT Malware Against Iran Protest Supporters
Security researchers have uncovered a new cyber espionage campaign, likely targeting individuals supporting ongoing protests in Iran. The operation, named CRESCENTHARVEST...
-
Security
/ 2 months agoNotepad++ Patches Security Flaw in Update System
The developers of the widely used text editor Notepad++ have released a critical security update to address a vulnerability that allowed...
-
Security
/ 2 months agoTrojanized Oura MCP Server Deploys StealC Infostealer
cybersecurity researchers have identified a new campaign distributing the SmartLoader malware, which uses a trojanized version of a legitimate Model Context...
-
Security
/ 2 months agoAI Assistants Exploited as Malware Command Hubs
cybersecurity researchers have revealed that popular artificial intelligence assistants can be manipulated to act as covert communication channels for malware. This...
-
Security
/ 2 months agoWeekly Security Recap: Add-In Hijacks, Zero-Days, Botnets
Security researchers have documented a significant shift in cyberattack strategies over the past week, where trusted software tools and established workflows...

