Browsing Tag
Malware
1999 posts
New Mocha Manakin Malware Deploys NodeInitRAT via Clickfix Attack
Red Canary uncovers 'Mocha Manakin,' a new threat using paste and runs to deliver custom NodeInitRAT malware, potentially leading to ransomware. Learn to protect your systems.
June 20, 2025
Scammers Insert Fake Support Numbers on Real Apple, Netflix, PayPal Pages
Cybercriminals are injecting fake support phone numbers onto official sites like Bank of America and Netflix. Learn how 'search parameter injection' scams work and protect yourself now.
June 19, 2025
N. Korean Hackers Use PylangGhost Malware in Fake Crypto Job Scam
North Korean hackers deploy PylangGhost malware through fake crypto job interviews targeting blockchain professionals with phishing and remote access tools.
June 19, 2025
GodFather Android Malware Runs Real Apps in a Sandbox to Steal Data
Zimperium zLabs reveals GodFather malware’s advanced virtualization that hijacks mobile banking and crypto apps. Learn how it steals data on your phone.
June 18, 2025
WormGPT Makes a Comeback Using Jailbroken Grok and Mixtral Models
Cato CTRL uncovers new WormGPT variants on Telegram powered by jailbroken Grok and Mixtral. Learn how cybercriminals jailbreak top LLMs for uncensored, illegal activities in this latest threat research.
June 18, 2025
Hacklink Market Linked to SEO Poisoning Attacks in Google Results
Cybersecurity researchers at Netcraft have discovered a series of new SEO poisoning related attacks exploiting Google’s search results…
June 17, 2025
Operation Secure: INTERPOL Disrupts 20,000 Infostealer Domains, 32 Arrested
INTERPOL disrupts 20,000 infostealer domains in major cybercrime crackdown across Asia-Pacific, 32 arrested, 216K victims notified in Operation Secure.
June 11, 2025
Two Mirai Botnets, Lzrd and Resgod Spotted Exploiting Wazuh Flaw
Akamai's latest report reveals two Mirai botnets exploiting the critical CVE-2025-24016 flaw in Wazuh. Learn about these fast-spreading IoT threats and urgent patching advice.
June 10, 2025
20 Top-Level Domain Names Abused by Hackers in Phishing Attacks
Disclosure: This article was provided by ANY.RUN. The information and analysis presented are based on their research and findings.
June 10, 2025
Hidden Backdoors in npm Packages Let Attackers Wipe Entire Systems
Malicious npm packages found with hidden endpoints that wipe systems on command. Devs warned to check dependencies for express-api-sync, system-health-sync-api.
June 9, 2025