Cybersecurity Threats

Hackers Exploiting YouTube to Spread Malware That Steals Browser DataHackers Exploiting YouTube to Spread Malware That Steals Browser Data

Hackers Exploiting YouTube to Spread Malware That Steals Browser Data

Malware actors leverage popular platforms like YouTube and social media to distribute fake installers. Reputable file hosting services are abused…

3 months ago
QSC: Multi-Plugin Malware Framework Installs Backdoor on WindowsQSC: Multi-Plugin Malware Framework Installs Backdoor on Windows

QSC: Multi-Plugin Malware Framework Installs Backdoor on Windows

The QSC Loader service DLL named "loader.dll" leverages two distinct methods to obtain the path to the Core module code.…

3 months ago
New FireScam Android Malware Abusing Firebase Services To Evade DetectionNew FireScam Android Malware Abusing Firebase Services To Evade Detection

New FireScam Android Malware Abusing Firebase Services To Evade Detection

FireScam is multi-stage malware disguised as a fake “Telegram Premium” app that steals data and maintains persistence on compromised devices…

3 months ago
Researchers Uncover Phishing-As-A-Service Domains Associated With Tycoon 2FAResearchers Uncover Phishing-As-A-Service Domains Associated With Tycoon 2FA

Researchers Uncover Phishing-As-A-Service Domains Associated With Tycoon 2FA

The Tycoon 2FA platform is a Phishing-as-a-Service (PhaaS) tool that enables cybercriminals to easily launch sophisticated phishing attacks targeting two-factor…

3 months ago
New Watering Hole Attack That Used Fake Adobe Flash Player Update To Deliver MalwareNew Watering Hole Attack That Used Fake Adobe Flash Player Update To Deliver Malware

New Watering Hole Attack That Used Fake Adobe Flash Player Update To Deliver Malware

Cybersecurity threats are increasingly targeting vulnerabilities in publicly exposed assets like VPNs and firewalls, exploited by various actors, including APT…

3 months ago
Hackers Abuse Google Ads To Attacking Graphic Design ProfessionalsHackers Abuse Google Ads To Attacking Graphic Design Professionals

Hackers Abuse Google Ads To Attacking Graphic Design Professionals

Researchers identified a threat actor leveraging Google Search ads to target graphic design professionals, as the actor has launched at…

4 months ago
New Chinese Surveillance Tool Attack Android Users Since 2017New Chinese Surveillance Tool Attack Android Users Since 2017

New Chinese Surveillance Tool Attack Android Users Since 2017

Wuhan Chinasoft Token Information Technology Co., Ltd. developed EagleMsgSpy, a surveillance tool operational since 2017, which, installed as an APK,…

4 months ago
Hackers Target Android Users via WhatsApp to Steal Sensitive DataHackers Target Android Users via WhatsApp to Steal Sensitive Data

Hackers Target Android Users via WhatsApp to Steal Sensitive Data

Researchers analyzed a malicious Android sample created using Spynote RAT, targeting high-value assets in Southern Asia, which, likely deployed by…

4 months ago
Black Basta Ransomware Leverages Microsoft Teams To Deliver Malicious PayloadsBlack Basta Ransomware Leverages Microsoft Teams To Deliver Malicious Payloads

Black Basta Ransomware Leverages Microsoft Teams To Deliver Malicious Payloads

In a resurgence since May 2024, the Black Basta ransomware campaign has exhibited a troubling escalation in its attack methods,…

4 months ago
Cloudflare Developer Domains Abused For Cyber AttacksCloudflare Developer Domains Abused For Cyber Attacks

Cloudflare Developer Domains Abused For Cyber Attacks

Cloudflare Pages, a popular web deployment platform, is exploited by threat actors to host phishing sites, as attackers leverage Cloudflare's…

4 months ago