Latest News
Malware Infects Linux and macOS via Typosquatted Go Packages
Socket exposes a typosquatting campaign delivering malware to Linux and macOS systems via malicious Go packages. Discover the…
March 6, 2025
SquareX Unveils Polymorphic Extensions that Morph Infostealers into Any Browser Extension – Password Managers, Wallets at Risk
Palo Alto, Singapore, 6th March 2025, CyberNewsWire
March 6, 2025
US Charges 12 in Chinese Hacker Network, Offers $10M Reward
U.S. indicts 12 in Chinese Hacker-for-Hire Network tied to cyber attacks on governments & media. DOJ offers $10M reward for info on key suspects.
March 6, 2025
Hackers Deploy AI Deepfake of YouTube CEO in Credential Theft Scam
YouTube CEO Neal Mohan was impersonated in a deepfake phishing scam. Learn about the attack, how to spot…
March 6, 2025
Chinese Silk Typhoon Group Targets IT Tools for Network Breaches
Microsoft warns that Chinese espionage group Silk Typhoon now exploits IT tools like remote management apps and cloud services to breach networks.
March 5, 2025
Alli AI Announces Upcoming Public Launch of AI-Powered Content Creation Platform
London, United Kingdom, 5th March 2025, CyberNewsWire
March 5, 2025
Hackers Exploit Cloud Misconfigurations to Spread Malware
Veriti Research reveals 40% of networks allow ‘any/any’ cloud access, exposing critical vulnerabilities. Learn how malware like XWorm…
March 5, 2025
LinkedIn Phishing Scam: Fake InMail Messages Spreading ConnectWise Trojan
Cofense uncovers new LinkedIn phishing scam delivering ConnectWise RAT. Learn how attackers bypass security with fake InMail emails…
March 5, 2025
Scammers Mailing Ransom Letters While Posing as BianLian Ransomware
Scammers are impersonating BianLian ransomware, and mailing fake ransom letters to businesses. Learn the red flags and how…
March 4, 2025
JavaGhost Uses Amazon IAM Permissions to Phish Organizations
Unit 42 uncovers JavaGhost’s evolving AWS attacks. Learn how this threat actor uses phishing, IAM abuse, and advanced…
March 4, 2025