malware 201
- Batavia Windows Spyware: Unveiling the Threat to Russian Organizations
- Hackers Exploit Leaked Shellter Tool to Spread Lumma Stealer and SectopRAT Malware
- SEO Poisoning Campaign Targets Over 8,500 SMB Users with Malware Disguised as AI Tools
- Cybercriminals Exploit Leaked Shellter Tool for Malicious Purposes
- Enhanced Atomic macOS Infostealer Poses Persistent Backdoor Threat
- Security Affairs Malware Newsletter Round 52: Crucial Insights and Updates
- North Korea-Linked Threat Actors Deploy macOS NimDoor Malware via Fake Zoom Updates
- Unveiling the Threat: Over 40 Malicious Firefox Extensions Targeting Cryptocurrency Wallets
- U.S. Imposes Sanctions on Russia's Aeza Group for Facilitating Cybercrime with Bulletproof Hosting
- North Korean Hackers Launch Sophisticated Web3 and Cryptocurrency Attacks with Nim Malware and ClickFix Tools
- NimDoor: The Resilient macOS Malware Targeting Crypto Firms
- TA829 and UNK_GreenSec Share Tactics and Infrastructure in Ongoing Malware Campaigns
- Comprehensive Malware Newsletter Round 51: Crucial Cybersecurity Updates
- Lapdogs: China-Linked Hackers Hijack Over 1,000 SOHO Devices for Espionage
- GIFTEDCROOK Malware: Evolution from Browser Stealer to Advanced Intelligence Tool
- Mustang Panda's Cyber Espionage Campaign Targets Tibetan Community with PUBLOAD and Pubshell Malware
- OneClik Malware: Targeting the Energy Sector with Advanced Techniques
- North Korean Hackers Latest Tactics Target Job Seekers with Malicious npm Packages
- Hackers Exploit ScreenConnect for Malware with Authenticode Stuffing
- Cyber Threat: Fake SonicWall VPN App Targets Corporate Credentials
- APT28 Exploits Signal for Malware Attacks on Ukrainian Officials
- APT28 Leverages Signal for BEARDSHELL and COVENANT Malware Deployment in Ukraine
- XDigo Malware: Critical Insights into Eastern European Government Cyber Attacks via Windows LNK Vulnerability
- Unveiling SparkKitty: Crypto-Stealing Malware Infiltrates Google Play and Apple App Store
- Qilin Ransomware Gang Introduces 'Call Lawyer' Feature to Intensify Victim Pressure
- SerpentineCloud Malware: A Stealthy Threat Injecting Python-Based Attacks via Cloudflare Tunnels
- Unveiling AntiDot: The Android Malware Threat Exploiting Overlays, Virtualization Fraud, and NFC Theft
- Malicious Minecraft Mods: Stargazers DaaS Exploits Gaming Community
- Godfather Android Malware Evolves: Uses Virtualization to Hijack Banking Apps
- BlueNoroff's Deepfake Zoom Scam Targets Crypto Employees with MacOS Malware
- Water Curse Hijacks 76 GitHub Accounts to Deliver Multi-Stage Malware Campaign
- North Korean Hackers Use Deepfakes in Zoom Calls to Spread Mac Malware
- Unveiling Multi-Stage Malware Attack on Python Package Index
- Cloudflare Tunnels Exploited in New Malware Campaign Delivering RATs via Phishing
- Minecraft Cheaters Beware: Malware Lurks in Popular Cheat Tools
- Minecraft Players Hit by Java Malware Disguised as Mods on GitHub
- Silver Fox APT Deploys Gh0stCringe and HoldingHands RAT Malware in Taiwan Phishing Campaign
- Security Affairs Malware Newsletter Round 49: Critical Updates and Analysis
- Unveiling the Threat: Discord Invite Link Hijacking Distributing AsyncRAT and Skuld Stealer Targeting Crypto Wallets
- Massive Cyber Threat: 269,000 Websites Compromised by JSFireTruck Malware in Just One Month
- Security Flaw in Discord Exploited by Hackers to Deliver Malware
- Operation Secure: INTERPOL's Major Cybercrime Crackdown Dismantles Over 20,000 Malicious IPs
- INTERPOL's Operation Secure: Dismantling 20,000+ Malicious IPs Linked to 69 Malware Variants
- Cybercriminals Target Recruiters with Malware via Phony Resumes
- Asia Takes Down 20,000 Malicious Domains in Major Infostealer Crackdown
- Rust-Based Myth Stealer Malware: A Threat to Chrome and Firefox Users via Fake Gaming Sites
- FIN6 Exploits AWS and LinkedIn with Fake Resumes to Deliver More_eggs Malware
- FIN6 Hackers Exploit Job Seeker Personas to Backdoor Recruiters' Devices
- DanaBot Malware Operators Unveiled: A 2022 C2 Bug Leads to Law Enforcement Takedown
- New Mirai Botnet Variant Targets TBK DVRs via CVE-2024-3721 Exploit
- Chinese Cyber Espionage: Strategic Malware Implants Detected in Over 75 Critical Organizations
- FBI Alert: BadBox 2.0 Botnet Compromises Millions of IoT Devices Globally
- Malware Newsletter Round 48: Critical Insights into Global Cyber Threats
- Major Supply Chain Malware Operation Impacts npm and PyPI Ecosystems, Affecting Millions Worldwide
- Malicious Browser Extensions Impact 722 Users Across Latin America Since Early 2025
- Critical Alert: Malicious npm Packages Pose as Utilities to Delete Project Directories
- U.S. Government Offers $10 Million Bounty for Information on RedLine Malware Creators and State-Sponsored Hackers
- Russia-Linked Threat Actors Deploy PathWiper Wiper Against Ukrainian Critical Infrastructure
- PathWiper: New Data Wiper Malware Targets Ukrainian Infrastructure in 2025
- Atomic macOS Stealer: New Campaign Targets Apple Users via ClickFix Exploit
- New Pro-Russian Wiper Malware Threatens Ukrainian Critical Infrastructure
- U.S. Government Announces $10 Million Reward for Information on RedLine Malware Hackers
- Iran-Linked 'BladedFeline' Hits Iraqi Targets
- FBI Warns: BADBOX 2.0 Malware Infects Millions of Android Devices
- Chaos RAT Malware: Targeting Windows and Linux Through Fake Network Tools
- Malicious RubyGems Masquerade as Fastlane to Steal Telegram API Data: Critical Security Alert
- Deceptive DocuSign and Gitcode Sites Spread NetSupport RAT via PowerShell Attacks
- Crocodilus: The Emerging Android Trojan Threat in Europe and South America
- Crocodilus Android Malware: Fake Contacts Spoof Trusted Callers
- Cybersecurity Weekly Roundup: May 26 - June 1, 2025
- Security Affairs Malware Newsletter Round 47: Essential Updates on Global Malware Threats
- Police Dismantle AVCheck: A Major Blow to Cybercriminal Malware Operations
- EDDIESTEALER: New Malware Exploits Chrome's Encryption to Steal Data
- Unmasking DanaBot: The Malware Behind 300K+ Infections and Its Imminent Shutdown
- Mac Users Targeted by Hackers Using Fake Ledger Apps to Steal Cryptocurrency
- FBI and Europol Take Down Lumma Stealer Malware Network Linked to 10 Million Infections
- SK Telecom Security Breach: The Unseen Threat Since 2022
- Surge in PureRAT Malware Attacks: Russian Firms Targeted with 4x Increase in 2025
- Major Takedown of Lumma Infostealer Malware: 2,300 Domains Seized
- Global Law Enforcement and Microsoft Dismantle Lumma Infostealer Service
- Fake Kling AI Facebook Ads Deliver RAT Malware to Over 22 Million Potential Victims
- Critical Alert: RVTools Official Site Compromised to Spread Bumblebee Malware via Infected Installer
- Rising Threat: Ransomware Gangs Embrace Skitnet for Post-Exploitation Activities
- Procolored Printers Distributed Malware-Infused Drivers for Months
- Unveiling PowerShell-Based Attacks: Fileless Remcos RAT Deployed via LNK Files and MSHTA
- Threat Actors Exploit Fake AI Tools to Deploy Noodlophile Information Stealer
- Cyber Threat Alert: Fake AI Tools Spread Noodlophile Malware on Facebook
- DOGE Employee Credentials Exposed in Infostealer Malware Dump
- iClicker Hack: Malware Disguised as Fake CAPTCHA Targets Students
- OtterCookie v4 Enhances VM Detection and Credential Theft Capabilities
- Malicious npm Packages Target macOS Cursor Users, Stealing Credentials and Installing Backdoors
- FBI Alerts: Cybercriminals Exploiting End-of-Life Routers for Malware and Proxy Services
- Block Google Sponsored Ads on iOS: Enhance Security and User Experience with Malwarebytes
- Russian Hackers Deploy New LOSTKEYS Malware Using Fake CAPTCHA
- MirrorFace's Cyber Espionage Campaign: Targeting Japan and Taiwan with ROAMINGMOUSE and Upgraded ANEL Malware
- Unveiling the Hidden RAT Malware: PyPI Package Targets Discord Developers Since 2022
- Critical Alert: Malware Disguised as Discord Tool on PyPI Affects Thousands
- Weekly Cybersecurity Recap: Nation-State Hacks, Spyware Alerts, Deepfake Malware, and Supply Chain Backdoors
- Golden Chickens Deploy TerraStealerV2 for Advanced Credential Theft
- Targeted Malware Campaign Against World Uyghur Congress Leaders via Trojanized UyghurEdit++ Tool
- Earth Kurma APT: Advanced Cyber Threats Targeting Southeast Asian Government and Telecom Sectors
- Cybersecurity Threats: A Comprehensive Analysis of Malware Trends and Attacks
- Cybersecurity Firm CEO Charged with Installing Malware on Hospital Systems
- Critical Alert: JPCERT Uncovers DslogdRAT Malware Exploiting Ivanti Connect Secure Vulnerability
- North Korean Hackers Deploy Malware Through Fake Crypto Firms and Job Interviews
- Crypto Mining Campaign Targets Docker Environments with New Evasion Technique
- SK Telecom Data Breach: USIM Information Exposed in Malware Attack
- SK Telecom Data Breach: Millions of Customers Potentially Affected by USIM Data Compromise
- Top 5 Security Concerns When Employees Use Browsers for Work
- Russia-Linked APT29 Targets European Diplomatic Entities with GRAPELOADER Malware
- The Rise of Malicious Memes: A New Cyber Threat
- Global Cyber Attacks Fueled by Russian Bulletproof Host Proton66
- APT29 Deploys Grapeloader Malware: Targeting European Diplomats with Wine-Tasting Lures
- Malicious npm Packages Exploit Telegram Bot API to Install SSH Backdoors on Linux
- Complex Multi-Stage Malware Attack Utilizes .JSE and PowerShell for Deploying Agent Tesla and XLoader
- Unveiling the XorDDoS Threat: New Controller and Expansion to Docker, Linux, and IoT
- Chinese Hackers Upgrade RAT Malware to Target Russian Government
- State-Sponsored Cyber Attacks: The Rising Threat of ClickFix Tactics
- Crypto Users Targeted by Node.js Malware via Fake Binance and TradingView Installers
- Mustang Panda's Advanced Cyber Attack on Myanmar: New Tactics and Enhanced Malware
- Mustang Panda APT Enhances Toolkit with New Backdoor and Keyloggers
- Midnight Blizzard Unleashes GrapeLoader Malware in Embassy Phishing Attacks
- ResolverRAT: New Cyber Threat Targeting Global Healthcare and Pharma Sectors
- ResolverRAT: New Malware Targets Healthcare and Pharmaceutical Firms with Advanced Data Theft Capabilities
- Malwarebytes Honored as 'Best Antivirus Software' and 'Best Malware Removal Service' in 2025
- Malicious NPM Packages Target PayPal Users: A Comprehensive Analysis
- SpyNote, BadBazaar, and MOONSHINE Malware: New Threats Targeting Android and iOS Users via Fake Apps
- Gamaredon's Latest Cyber Attack: Infected Drives Target Western Military Mission in Ukraine
- Europol Arrests Five Suspects Linked to Smokeloader Botnet: Details Emerge
- Europol's Coordinated Operation Takes Down Five SmokeLoader Malware Clients
- Cyber Police Disrupt Smokeloader Malware Network, Arrest Customers, and Seize Infrastructure
- New TCESB Malware Exploits ESET Security Scanner in Active Cyber Attacks
- Cyber Spying Alert: Man Accused of Using Keylogger to Breach Colleagues' Privacy
- UAC-0226 Deploys GIFTEDCROOK Stealer Through Malicious Excel Files Targeting Ukraine
- Scattered Spider Evolves: New Phishing Kit and Spectre RAT Variant in 2025
- Beware: Fake Microsoft Office Add-ins on SourceForge Spread Malware to Steal Cryptocurrency
- Cryptocurrency Miner and Clipper Malware Spread Through SourceForge Cracked Software Listings
- Malicious VSCode Extensions Infecting Windows with Cryptominers: A Threat to Developers
- CISA and FBI Alert: Fast Flux Technique Empowers Resilient Malware and Phishing Operations
- Security Affairs Malware Newsletter Round 40: Crucial Updates on Global Malware Threats
- OPSEC Blunder Reveals Cybercriminal Operations on Bulletproof Hosting
- Critical Ivanti Flaw Actively Exploited: What You Need to Know
- CERT-UA Unveils Cyberattacks Using WRECKSTEEL Malware Against Ukrainian State Systems
- CERT-UA Reports: March 2025 Cyberattacks on Ukrainian Agencies Using WRECKSTEEL Malware
- Triada Malware Infiltrates Over 2,600 Devices via Counterfeit Android Phones
- New Triada Trojan Variant Preinstalled on Android Devices
- Microsoft Alerts: Tax-Themed Phishing Attacks Using PDFs and QR Codes Deliver Malware
- Major Data Breach: Royal Mail and Samsung Germany Compromised by Infostealer Malware
- Unmasking Polyglot Malware: A Sophisticated Cybersecurity Threat
- Advanced Malware Loaders: Leveraging Call Stack Spoofing, GitHub C2, and .NET Reactor for Enhanced Stealth
- FIN7's Advanced Anubis Backdoor: Full System Control on Windows
- Unmasking a Sophisticated Malware Delivery Chain: The Intricate Web of DCRat & Rhadamanthys
- CISA Alerts: New Spawn Malware Exploits Ivanti Vulnerability
- Russia-Linked Gamaredon Group Targets Ukraine with Remcos RAT: A Detailed Analysis
- CoffeeLoader Evades Detection with Advanced GPU-Based Techniques
- Weekly Security Affairs Newsletter Round 517: International Edition
- Critical Malware Updates: Security Affairs Round 39 Newsletter
- RESURGE Malware Leverages Ivanti Vulnerability with Advanced Rootkit and Web Shell Capabilities
- Emerging Threats: Malware in Uncommon Languages like Lisp
- PJobRAT Malware Campaign: Taiwanese Users Targeted via Fake Chat Apps
- CoffeeLoader Evades Detection with GPU-Based Armoury Packer: Insights from Cybersecurity Experts
- CISA Issues Critical Malware Analysis Report on RESURGE Malware Linked to Ivanti Connect Secure Vulnerabilities
- Infostealer Campaign Targets Developers by Compromising 10 npm Packages
- Cybercriminals Exploit DeepSeek Popularity with Fake Google Ads to Spread Malware
- FamousSparrow Hackers Upgrade Malware in Latest Cyber Attacks
- Pakistan-Linked APT36 Group Targets India Post Users with Malware Campaign
- Unveiling New SparrowDoor Backdoor Variants in U.S. and Mexican Cyber Attacks
- New ReaderUpdate Malware Variants Target macOS Users
- EncryptHub Exploits Windows Zero-Day to Deploy Rhadamanthys and StealC Malware
- Researchers Identify Nearly 200 Unique C2 Domains Linked to Raspberry Robin Access Broker
- Emerging Android Malware Leverages Microsoft’s .NET MAUI for Stealthy Attacks
- Cyber Threat Alert: .NET MAUI Exploited to Target Indian and Chinese Users with Fake Banking and Social Apps
- Android Malware Leverages .NET MAUI for Evasion Tactics
- FBI Alerts: Free Online Document Converters Spreading Malware
- Critical Malware Updates: Security Affairs Newsletter Round 38
- Beware of Fake File Converters: FBI Alerts on Malware Risks
- Microsoft Trust Signing Service Exploited for Malware Code-Signing
- Medusa Ransomware Leverages Malicious Driver to Bypass Anti-Malware with Stolen Certificates
- YouTube Game Cheats Spreading Arcane Stealer Malware Among Russian-Speaking Users
- RansomHub Ransomware Employs New Betruger Multi-Function Backdoor
- Advanced LLM Jailbreak Technique Facilitates Password-Stealing Malware Development
- Arcane Infostealer: New Cyber Threat Targeting YouTube and Discord Users Through Game Cheats
- ClearFake Malware Campaign: 9,300 Sites Infected Using Fake reCAPTCHA and Turnstile
- Malicious .lnk Files Exploited by Nation-State Actors for Espionage and Data Theft
- Microsoft Alerts Users to StilachiRAT: A Sophisticated Threat to Credentials and Crypto Wallets
- Uncovering Android's 'Vapor' Threat: 60 Million Installs from Google Play
- China-Linked MirrorFace Cyber Espionage: Deploying ANEL and AsyncRAT in European Union Attack
- Warning: AMOS and Lumma Stealers Targeting Reddit Crypto Enthusiasts
- Beware: Free Online File Converters May Install Malware
- Microsoft Uncovers Advanced RAT Malware Targeting Crypto Theft and Reconnaissance
- DeepSeek's Malware Development Capabilities: Cyber Experts Warn of Potential Risks
- Security Affairs Newsletter Round 515: Global Cybersecurity Insights
- Uncovering the Latest Malware Threats: A Comprehensive Review
- OBSCURE#BAT Malware: How Fake CAPTCHA Pages Deploy Rootkit r77 and Evade Detection
- MassJacker: New Malware Threat Targeting Piracy Users in Cryptocurrency Heists
- Unveiling KoSpy: North Korea's ScarCruft Targets Android Users with Fake Utility Apps
- Unveiling KoSpy: ScarCruft's New Android Spyware Targeting Korean and English Users
- Beware: ClickFix Attack Spreads Malware Through Fake Booking.com Emails
- MassJacker Malware: Massive Cryptocurrency Theft Using 778,000 Wallets
- Malware Alert: Hackers Exploit Bypassing Tools to Distribute Miners via YouTube
- U.S. Charges 16 Russians Linked to Botnets for Ransomware, Cyberattacks, and Espionage