Tom's HardwareMalware found embedded in DNS, the system that makes the internet usable, except when it doesn'tYesterdayBy Nathaniel MottMore
TechRadarIt seems even DNS records can be infected with malware now - here's why that's a major worry8 hours agoBy Sead FadilpašićMore
The Hacker NewsEuropol Disrupts NoName057(16) Hacktivist Group Linked to DDoS Attacks Against Ukraine9 hours agoBy Ravie LakshmananMore
ABC News - Breaking News, Latest News and VideosPro-Russia cybercrime network targeted by European law enforcement14 hours agoBy Kevin ShalveyMore
AP NewsEuropol-coordinated global operation takes down pro-Russian cybercrime networkYesterdayBy Mike CorderMore
ReutersSeven arrest warrants issued in global swoop on suspected Russia-linked hackersYesterdayBy Giulia Segreti & Thomas EscrittMore
KasperskyGhostContainer discovered: Kaspersky identifies a new backdoor targeting Microsoft Exchange servers8 hours agoMore
CyberSecurityNewsGhostContainer Malware Hacking Exchange Servers in the Wild Using N-day Vulnerability9 hours agoBy Guru BaranMore
Computing UKKaspersky identifies new backdoor targeting Microsoft Exchange servers11 hours agoBy Penny HorwoodMore
The Hacker NewsHackers Leverage Microsoft Teams to Spread Matanbuchus 3.0 Malware to Targeted FirmsYesterdayBy Ravie LakshmananMore
MorphisecFrom a Teams Call to a Ransomware Threat: Matanbuchus 3.0 MaaS Levels Up18 hours agoBy Michael GorelikMore
Dark Reading | SecurityElite 'Matanbuchus' Loader Spruces Up Ransomware Infections18 hours agoBy Nate NelsonMore
CyberSecurityNewsMicrosoft Teams Call Weaponized to Deploy and Execute Matanbuchus RansomwareYesterdayBy Tushar Subhra DuttaMore
Search Engine JournalCloudflare DDoS Report: 63% Of Known Attacks Blamed On Competitors23 hours agoBy Roger MonttiMore
The Cloudflare BlogHyper-volumetric DDoS attacks skyrocket: Cloudflare’s 2025 Q2 DDoS threat report2 days agoBy Omer Yoachimik & Jorge PachecoMore
The Hacker NewsHyper-Volumetric DDoS Attacks Reach Record 7.3 Tbps, Targeting Key Global Sectors2 days agoBy Ravie LakshmananMore
ET Edge Insights7.3 Mn DDoS attacks in 2025: Is the Indian internet under permanent siege? - ET Edge Insights11 hours agoBy Poonam MondalMore
ChosunbizSouth Korea ranks fifth in global DDoS damage amid record 7.3 Tbps attack - CHOSUNBIZYesterdayMore
The Record from Recorded Future NewsGoogle spots tailored backdoor malware aimed at SonicWall appliancesYesterdayBy Jonathan GreigMore
BleepingComputerSonicWall SMA devices hacked with OVERSTEP rootkit tied to ransomwareYesterdayBy Ionut IlascuMore
Dark Reading | SecurityFully Patched SonicWall Gear Under Likely Zero-Day AttackYesterdayBy Jai VijayanMore
The Hacker NewsUNC6148 Backdoors Fully-Patched SonicWall SMA 100 Series Devices with OVERSTEP RootkitYesterdayBy Ravie LakshmananMore
theregister.comCrims hijacking fully patched SonicWall VPNs to deploy stealthy backdoor and rootkitYesterdayBy Jessica LyonsMore
The Hacker NewsHackers Use GitHub Repositories to Host Amadey Malware and Data Stealers, Bypassing Filters3 hours agoBy Ravie LakshmananMore
TechRadarA harmless-looking free VPN on GitHub installs a hidden backdoor that spies on everything you do4 days agoBy Efosa UdinmwenMore
CyberSecurityNewsHackers Abused GitHub to Spread Malware Mimic as VPN7 days agoBy Tushar Subhra DuttaMore
CyberScoopHouse hearing will use Stuxnet to search for novel ways to confront OT cyberthreatsYesterdayBy Derek B. JohnsonMore
Industrial CyberCyberCube, Munich Re push for stronger cyber catastrophe modeling as cloud and malware threats intensify6 hours agoBy Anna Christina RibeiroMore
ASISGlobal Catastrophic Malware Attack Would Be Shocking, Not Impossible, Study SuggestsYesterdayBy Claire MeyerMore
Insurance Business AmericaRansomware still dominates, but systemic events are harder to model – Munich Re2 days agoBy Kenneth AraulloMore
Risk & InsuranceOrganizations Can Cut Malware Impact by Up to 80% With Proper Defenses: Survey2 days agoMore
BleepingComputerLameHug malware uses AI LLM to craft Windows data-theft commands in real-time2 hours agoBy Bill ToulasMore
The Hacker NewsNew Konfety Malware Variant Evades Detection by Manipulating APKs and Dynamic CodeYesterdayBy Ravie LakshmananMore
BleepingComputerAndroid malware Konfety uses malformed APKs to evade detection2 days agoBy Bill ToulasMore
Global Security Mag OnlineZimperium zLabs Uncovers Sophisticated Variant of Konfety Malware Targeting Android Devices2 days agoMore
TechRadarThis dangerous new Android malware looks to hide from detection with distorted APKsYesterdayBy Sead FadilpašićMore
BleepingComputerGigabyte motherboards vulnerable to UEFI malware bypassing Secure Boot3 days agoBy Bill ToulasMore
Tom's HardwareCritical UEFI vulnerabilities found in Gigabyte motherboards — allow attackers to bypass Secure Boot and install firmware backdoors2 days agoBy Kunal KhullarMore
PC GamerIf you're using an Intel 8–11th Gen CPU with a Gigabyte motherboard, update your BIOS to protect from a newly discovered vulnerability2 days agoBy Jacob FoxMore
SecurityWeekFlaws in Gigabyte Firmware Allow Security Bypass, Backdoor Deployment3 days agoBy Ionut ArghireMore
TechPowerUpFour UEFI Flaws in GIGABYTE Motherboards Expose 240+ Models to Persistent Bootkits2 days agoMore
SecurelistThe Solidity Language open-source package was used in a $500000 crypto heist7 days agoBy Georgy KucherinMore
BleepingComputerMalicious VSCode extension in Cursor IDE led to $500K crypto theft3 days agoBy Lawrence AbramsMore
i-hls.comWidespread Risk in AI Code Editors: Vibe Coders Exposed to Malicious Extensions3 days agoMore
OffshoreAlertGoogle LLC v. Does 1-15: Complaint (‘Chinese Cybercriminals’ Botnet of Inter-Connected TV Devices’)6 days agoBy David MarchantMore
Yahoo FinanceBest Malware Protection (2025): ESET Named Leading Anti-Malware Software by Software ExpertsYesterdayMore
The Hacker NewsAsyncRAT's Open-Source Code Sparks Surge in Dangerous Malware Variants Across the Globe2 days agoBy Ravie LakshmananMore
TradingViewESET Research uncovers variants of AsyncRAT, popular choice of cybercriminals2 days agoMore
MalwarebytesMillions of people spied on by malicious browser extensions in Chrome and Edge8 days agoBy Pieter ArntzMore
theregister.comMassive browser hijacking campaign infects 2.3M Chrome, Edge users9 days agoBy Jessica LyonsMore
CybernewsMassive browser hijack: extensions turn Trojan and infect 2.3M Chrome and Edge users3 days agoMore
MintGoogle Chrome issues urgent warning: Harmful extensions could be spying on everything you do online11 hours agoBy Bharat SharmaMore
BleepingComputerWordPress Gravity Forms developer hacked to push backdoored plugins6 days agoBy Bill ToulasMoreFull Coverage of this story
The Record from Recorded Future NewsBeware of Bert: New ransomware group targets healthcare, tech firms10 days agoBy Daryna AntoniukMore
CyberSecurityNewsRansomware Gangs Actively Expanding to Attack VMware and Linux Systems2 days agoBy Tushar Subhra DuttaMore
LinkedInBert Ransomware: A Rising Global Threat Targeting Healthcare and Technology in 20258 days agoMore
MorphisecLinux Is No Longer Immune: Why Ransomware Gangs Are Going All-In on Linux TargetsOpinion3 days agoBy Brad A LaporteMore
MakeUseOfDon’t Tap That Notification—This Is How Malware Sneaks Onto SmartphonesYesterdayBy Danny MaiorcaMore
Tom's GuideThis Mac malware just got a major upgrade which makes it even harder to delete — how to stay safe9 days agoBy Anthony SpadaforaMore
BleepingComputerAtomic macOS infostealer adds backdoor for persistent attacks10 days agoBy Bill ToulasMore
TechRadarOne of the biggest security threats to Apple systems just got a major upgrade - here's what we know9 days agoBy Sead FadilpašićMore
Flashpoint.ioThe Rising Threat of macOS Infostealers: What You Need to Know to Defend Against Them7 days agoMore
CybernewsRussia-linked macOS malware just got a whole lot more dangerous8 days agoBy Paulina OkunyteMore
The Hacker NewsNorth Korean Hackers Flood npm Registry with XORIndex Malware in Ongoing Attack Campaign2 days agoBy Ravie LakshmananMore
BleepingComputerNorth Korean XORIndex malware hidden in 67 malicious npm packages2 days agoBy Bill ToulasMore
CyberSecurityNewsMacOS Malware NimDoor Weaponizing Zoom SDK Update to Steal Keychain CredentialsYesterdayBy Tushar Subhra DuttaMore
NK NewsNorth Korean hackers unleash new malware in campaign targeting IT workers11 hours agoBy Dave YinMore
CyberSecurityNewsSymantec Endpoint Management Suite Vulnerability Allows Malicious Code Execution Remotely2 days agoBy Guru BaranMore
BleepingComputerInterlock ransomware adopts new FileFix attack to push malware3 days agoBy Bill ToulasMore
The Hacker NewsNew PHP-Based Interlock RAT Variant Uses FileFix Delivery Mechanism to Target Multiple Industries3 days agoBy Ravie LakshmananMore
TechRadarHackers are abusing 'FileFix' technique to drop RATs during ransomware attacks2 days agoBy Sead FadilpašićMore
Dark Reading | SecurityWeb-Inject Campaign Debuts Fresh Interlock RAT Variant3 days agoBy Alexander CulafiMore
MalwarebytesAndroid threats rise sharply, with mobile malware jumping by 151% since start of yearJun 30By Pieter ArntzMore
CybernewsThe rising threat of mobile malware: How to protect your device in 202514 days agoBy Nihad A. HassanMore
CyberSecurityNewsHackers Using 607 Malicious Domains to Deliver APK Malware That Enables Remote Command Execution13 hours agoBy Tushar Subhra DuttaMore
Dark Reading | SecurityAltered Telegram App Steals Chinese Users' Android Data2 days agoBy Robert LemosMore
Cyber PressHackers Deploy APK Malware with Remote Command Execution via 607 Malicious DomainsYesterdayMore
gbhackers.comHackers Leverage 607 Malicious Domains to Spread APK Malware with Remote Command ExecutionYesterdayBy Aman MishraMore
The Hacker NewsFake Gaming and AI Firms Push Malware on Cryptocurrency Users via Telegram and Discord7 days agoBy Ravie LakshmananMore
CointelegraphThreat actors using ‘elaborate social engineering scheme’ to target crypto users — Report7 days agoBy Christopher TepedinoMore
CCN.comFake Video Meeting Apps Like ‘Meeten’ Used To Deploy Wallet-Stealing Malware6 days agoBy James MoralesMore
CyberSecurityNewsDark Partners Hackers Group Wiping Crypto Wallets With Fake Ai Tools and VPN ServicesYesterdayBy Tushar Subhra DuttaMore
NewsBreak: Local News & AlertsKY attorney general sues Temu over malware, counterfeiting claims1 hour agoMore
The Daily HodlNew Banking Malware Hammers US and Canada, Reaches Over 50,000 Android Users in Just Six Days5 days agoBy Mark EmemMore
The MirrorEveryone with an Android phone put on red alert as massive new threat confirmed8 days agoBy Dave SnellingMore
BeInCryptoA New Malware Is Hijacking Computers to Secretly Mine Monero (XMR)2 hours agoBy Mohammad ShahidMore
ZDNETCloudflare blocks largest DDoS attack - here's how to protect yourselfJun 27By Steven J. Vaughan-NicholsMore
TheTechPandaYour AI is now mine: A subtle but alarming new contest between cyber attackers & defendersJun 30By Navanwita Bora SachdevMore
TechRadarThis new malware has developed a spooky way to tell AI-based detection methods to ignore itJun 27By Benedict CollinsMore
gbhackers.comThreat Actors Deploy 28+ Malicious Packages to Spread Protestware ScriptsYesterdayBy Aman MishraMore
BleepingComputerAPT28 hackers use Signal chats to launch new malware attacks on UkraineJun 23By Bill ToulasMore
Dark Reading | SecurityRussian APT 'Gamaredon' Hits Ukraine With Fierce Phishing15 days agoBy Alexander CulafiMore
EADailyHackers hacked the document management system: it became clear why Kiev is hiding lossesJun 24More
Security AffairsRussia-linked APT28 use Signal chats to target Ukraine official with malwareJun 24By Pierluigi PaganiniMore
WeLiveSecurityGamaredon in 2024: Cranking out spearphishing campaigns against Ukraine with an evolved toolset15 days agoBy Zoltan RusnakMore
The Hacker NewsWeekly Recap: Scattered Spider Arrests, Car Exploits, macOS Malware, Fortinet RCE and More3 days agoBy Ravie LakshmananMore
VOI.IDKaspersky Urges Proactive Action in Alleged Cyberattack on UK RetailerYesterdayBy Ary JuliantoMore
TheBusinessDesk.comFour arrested over cyberattacks on retail giants bailedYesterdayBy Ellie HollinsheadMore
YahooFour people bailed after arrests over cyber attacks on M&S, Co-op and HarrodsYesterdayBy Mathilde GrandjeanMore
WebProNewsChinese Authorities Deploy 'Massistant' Malware to Extract Encrypted Data from Seized Android and iOS Phones in Xinjiang9 hours agoMore
upi.comNew software makes it easy for Chinese police to extract phone dataYesterdayBy Lisa HornungMore
TechCrunchChinese authorities are using a new tool to hack seized phones and extract dataYesterdayBy Lorenzo Franceschi-BicchieraiMore
PYMNTS.comLookout Warns Travelers That Chinese Authorities Can Extract Data From Phones22 hours agoMore
CyberSecurityNewsMassistant Chinese Mobile Forensic Tooling Gain Access to SMS Messages, Images, Audio and GPS Data5 hours agoBy Tushar Subhra DuttaMore
TechRadarClickFix fake error message malware spikes over 500%, takes second place as the most abused attack vectorJun 27By Benedict CollinsMore
BleepingComputerNew FileFix attack runs JScript while bypassing Windows MoTW alerts16 days agoBy Bill ToulasMore
매일경제When a user requests "create ransomware code" in a typical interactive artificial intelligence (AI) .. - MK23 hours agoMore
Israel DefenseIsraeli Cyber Authority Warns of New Social Engineering Tactic Using Fake CAPTCHAYesterdayBy Mandi KogosowskiMore
Business Today'Verify you are human...': This fake verification page can steal your passwords in seconds2 days agoBy Lakshay KumarMore
gbhackers.comRhadamanthys Infostealer Uses ClickFix Technique to Steal Login Credentials7 days agoBy Aman MishraMore
News18'Can Activate Malware, Bugs': Govt To Probe Security Risks From Chinese Medical Devices16 hours agoBy Himani Chandna & Apoorva MisraMore
The Economic TimesDomestic med-tech companies flag security threat from Chinese devicesYesterdayBy Teena ThackerMore
Medical BuyerChinese medical devices spark data, security, defense fears in India meeting18 hours agoMore
Radio Free Europe/Radio LibertyThe Hidden Threat: How DanaBot Malware Facilitated Data Theft And Russian State-Sponsored SpyingJun 20By Mike EckelMore
BleepingComputerNew wave of ‘fake interviews’ use 35 npm packages to spread malwareJun 25By Bill ToulasMore
LifehackerThere's New Reason to Never Keep Screenshots of Private Information on Your PhoneJun 24By Emily LongMore
Toronto StarThis malware found in Google Play and Apple Store can steal photos from your phone15 days agoBy Loraine CentenoMore
ZDNETYou should probably delete any sensitive screenshots you have in your phone right now. Here's whyJun 26By Artie BeatyMore
The Hacker NewsMalicious Pull Request Targets 6,000+ Developers via Vulnerable Ethcode VS Code Extension9 days agoBy Ravie LakshmananMore
DecryptMalicious Pull Request Inserted Into Ethereum Code Extension: Research6 days agoBy Simon ChandlerMore
ITC.uaAI has learned to write malicious code that bypasses Microsoft Defender: a wake-up call for cybersecurity5 days agoBy Vadym KarpusMore
Dark Reading | SecurityNew AI Malware PoC Reliably Evades Microsoft DefenderOpinion8 days agoBy Nate NelsonMore
PCWorldAI malware could beat Microsoft Defender up to 8 percent of the timeOpinion2 days agoBy Michael CriderMore
Windows CentralAI-powered malware eludes Microsoft Defender's security checks 8% of the time — with just 3 months of training and "reinforcement learning" for around $1,6002 days agoBy Kevin OkemwaMore
Tom's HardwareAI malware can now evade Microsoft Defender — open-source LLM outsmarts tool around 8% of the time after three months of training7 days agoBy Nathaniel MottMore
PC GamerDDoS attacks continue to grow ever bigger, with Cloudflare recently blocking the largest ever recorded at 37.5 TB over 45 secondsJun 25By Nick EvansonMore
The Hacker NewsSEO Poisoning Campaign Targets 8,500+ SMB Users with Malware Disguised as AI Tools10 days agoBy Ravie LakshmananMore
CyberSecurityNewsWeaponized Versions of PuTTY and WinSCP Attacking IT Admins Via Search Results9 days agoBy Guru BaranMore
TechRadarBe careful where you click in Google search results - it could be damaging malware9 days agoBy Sead FadilpašićMore
digit.inBeware! Hackers are using Google Search to trick you into downloading malware, here’s how7 days agoBy Himani JhaMore
Mashable IndiaThink Before You Click: Fake Google Search Results Are Spreading Malware7 days agoBy Priya SinghMore
SDxCentralDDoS attacks are outpacing networks as attack sizes rise by almost 70%Jun 23By Ben WodeckiMore
The Hacker NewsGIFTEDCROOK Malware Evolves: From Browser Stealer to Intelligence-Gathering ToolJun 28By Ravie LakshmananMore
Arctic WolfGIFTEDCROOK's Strategic Pivot: From Browser Stealer to Data Exfiltration Platform During Critical Ukraine NegotiationsJun 26More
The Hacker News200+ Trojanized GitHub Repositories Found in Campaign Targeting Gamers and DevelopersJun 20By Ravie LakshmananMore
The Hacker NewsNew Android Malware Surge Hits Devices via Overlays, Virtualization Fraud, and NFC TheftJun 19By Ravie LakshmananMore
The Hacker NewsNew Malware Campaign Uses Cloudflare Tunnels to Deliver RATs via Phishing ChainsJun 18By Ravie LakshmananMore