Malware

Hackers Exploiting 7-Zip Zero-Day Vulnerability to Deploy SmokeLoader MalwareHackers Exploiting 7-Zip Zero-Day Vulnerability to Deploy SmokeLoader Malware

Hackers Exploiting 7-Zip Zero-Day Vulnerability to Deploy SmokeLoader Malware

A newly identified zero-day vulnerability in the widely used 7-Zip archiving software, designated as CVE-2025-0411. This critical flaw, which was…

2 months ago
New Process Hollowing Attack Vectors Uncovered in Windows 11 (24H2)New Process Hollowing Attack Vectors Uncovered in Windows 11 (24H2)

New Process Hollowing Attack Vectors Uncovered in Windows 11 (24H2)

A significant evolution in the cybersecurity landscape has emerged with the uncovering of new vulnerabilities in Windows 11 (24H2). Process…

2 months ago
Google Researchers Breakdowns Scatterbrain Behind PoisonPlug MalwareGoogle Researchers Breakdowns Scatterbrain Behind PoisonPlug Malware

Google Researchers Breakdowns Scatterbrain Behind PoisonPlug Malware

Google’s Threat Intelligence Group (GTIG) in collaboration with Mandiant has revealed critical insights into ScatterBrain, a sophisticated obfuscation tool utilized…

2 months ago
TorNet Backdoor Exploits Windows Scheduled Tasks to Deploy MalwareTorNet Backdoor Exploits Windows Scheduled Tasks to Deploy Malware

TorNet Backdoor Exploits Windows Scheduled Tasks to Deploy Malware

Cisco Talos researchers have identified an ongoing cyber campaign, active since mid-2024, deploying a previously undocumented backdoor known as "TorNet."…

2 months ago
Beware of Fake Captcha Verifications Spreading Lumma MalwareBeware of Fake Captcha Verifications Spreading Lumma Malware

Beware of Fake Captcha Verifications Spreading Lumma Malware

In January, Netskope Threat Labs uncovered a sophisticated global malware campaign leveraging fake CAPTCHA pages to deliver the Lumma Stealer…

2 months ago
GhostGPT – Jailbreaked ChatGPT that Creates Malware & ExploitsGhostGPT – Jailbreaked ChatGPT that Creates Malware & Exploits

GhostGPT – Jailbreaked ChatGPT that Creates Malware & Exploits

Artificial intelligence (AI) tools have revolutionized how we approach everyday tasks, but they also come with a dark side. Cybercriminals…

2 months ago
Beware! Fake SBI Reward APK Attacking Users to Deliver Android MalwareBeware! Fake SBI Reward APK Attacking Users to Deliver Android Malware

Beware! Fake SBI Reward APK Attacking Users to Deliver Android Malware

A recent phishing campaign has targeted customers of SBI Bank through a deceptive message circulating in WhatsApp groups. The message…

2 months ago
Gootloader Malware Employs Blackhat SEO Techniques To Attack VictimsGootloader Malware Employs Blackhat SEO Techniques To Attack Victims

Gootloader Malware Employs Blackhat SEO Techniques To Attack Victims

The Gootloader malware family employs sophisticated social engineering tactics to infiltrate computers. By leveraging compromised legitimate WordPress websites, Gootloader's operators…

2 months ago
Hackers Weaponize npm Packages To Steal Solana Private Keys Via GmailHackers Weaponize npm Packages To Steal Solana Private Keys Via Gmail

Hackers Weaponize npm Packages To Steal Solana Private Keys Via Gmail

Socket’s threat research team has identified a series of malicious npm packages specifically designed to steal private keys from Solana…

2 months ago
Hackers Weaponize MSI Packages & PNG Files to Deliver Multi-stage MalwareHackers Weaponize MSI Packages & PNG Files to Deliver Multi-stage Malware

Hackers Weaponize MSI Packages & PNG Files to Deliver Multi-stage Malware

Researchers have reported a series of sophisticated cyber attacks aimed at organizations in Chinese-speaking regions, including Hong Kong, Taiwan, and…

2 months ago