• HOOK Android Trojan Adds Ransomware Overlays, Expands to 107 Remote Commands

    HOOK Android Trojan Adds Ransomware Overlays, Expands to 107 Remote Commands

    Cybersecurity researchers have discovered a new variant of an Android banking trojan called HOOK that features ransomware-style overlay screens to display extortion messages. “A prominent characteristic of the latest variant is its capacity to deploy a full-screen ransomware overlay, which aims to coerce the victim into remitting a ransom payment,” Zimperium zLabs researcher Vishnu Pratapagiri

    Read More

  • Google to Verify All Android Developers in 4 Countries to Block Malicious Apps

    Google to Verify All Android Developers in 4 Countries to Block Malicious Apps

    Google has announced plans to begin verifying the identity of all developers who distribute apps on Android, even for those who distribute their software outside the Play Store. “Android will require all apps to be registered by verified developers in order to be installed by users on certified Android devices,” the company said. “This creates…

    Read More

  • UNC6384 Deploys PlugX via Captive Portal Hijacks and Valid Certificates Targeting Diplomats

    UNC6384 Deploys PlugX via Captive Portal Hijacks and Valid Certificates Targeting Diplomats

    A China-nexus threat actor known as UNC6384 has been attributed to a set of attacks targeting diplomats in Southeast Asia and other entities across the globe to advance Beijing’s strategic interests. “This multi-stage attack chain leverages advanced social engineering including valid code signing certificates, an adversary-in-the-middle (AitM) attack, and indirect execution techniques to evade

    Read More

  • Phishing Campaign Uses UpCrypter in Fake Voicemail Emails to Deliver RAT Payloads

    Phishing Campaign Uses UpCrypter in Fake Voicemail Emails to Deliver RAT Payloads

    Cybersecurity researchers have flagged a new phishing campaign that’s using fake voicemails and purchase orders to deliver a malware loader called UpCrypter. The campaign leverages “carefully crafted emails to deliver malicious URLs linked to convincing phishing pages,” Fortinet FortiGuard Labs researcher Cara Lin said. “These pages are designed to entice recipients into downloading JavaScript

    Read More

  • ⚡ Weekly Recap: Password Manager Flaws, Apple 0-Day, Hidden AI Prompts, In-the-Wild Exploits & More

    ⚡ Weekly Recap: Password Manager Flaws, Apple 0-Day, Hidden AI Prompts, In-the-Wild Exploits & More

    Cybersecurity today moves at the pace of global politics. A single breach can ripple across supply chains, turn a software flaw into leverage, or shift who holds the upper hand. For leaders, this means defense isn’t just a matter of firewalls and patches—it’s about strategy. The strongest organizations aren’t the ones with the most tools,…

    Read More

  • Why SIEM Rules Fail and How to Fix Them: Insights from 160 Million Attack Simulations

    Why SIEM Rules Fail and How to Fix Them: Insights from 160 Million Attack Simulations

    Security Information and Event Management (SIEM) systems act as the primary tools for detecting suspicious activity in enterprise networks, helping organizations identify and respond to potential attacks in real time. However, the new Picus Blue Report 2025, based on over 160 million real-world attack simulations, revealed that organizations are only detecting 1 out of 7…

    Read More

  • Transparent Tribe Targets Indian Govt With Weaponized Desktop Shortcuts via Phishing

    Transparent Tribe Targets Indian Govt With Weaponized Desktop Shortcuts via Phishing

    The advanced persistent threat (APT) actor known as Transparent Tribe has been observed targeting both Windows and BOSS (Bharat Operating System Solutions) Linux systems with malicious Desktop shortcut files in attacks targeting Indian Government entities. “Initial access is achieved through spear-phishing emails,” CYFIRMA said. “Linux BOSS environments are targeted via weaponized .desktop

    Read More

  • Malicious Go Module Poses as SSH Brute-Force Tool, Steals Credentials via Telegram Bot

    Malicious Go Module Poses as SSH Brute-Force Tool, Steals Credentials via Telegram Bot

    Cybersecurity researchers have discovered a malicious Go module that presents itself as a brute-force tool for SSH but actually contains functionality to discreetly exfiltrate credentials to its creator. “On the first successful login, the package sends the target IP address, username, and password to a hard-coded Telegram bot controlled by the threat actor,” Socket researcher…

    Read More

  • GeoServer Exploits, PolarEdge, and Gayfemboy Push Cybercrime Beyond Traditional Botnets

    GeoServer Exploits, PolarEdge, and Gayfemboy Push Cybercrime Beyond Traditional Botnets

    Cybersecurity researchers are calling attention to multiple campaigns that leverage known security vulnerabilities and expose Redis servers to various malicious activities, including leveraging the compromised devices as IoT botnets, residential proxies, or cryptocurrency mining infrastructure. The first set of attacks entails the exploitation of CVE-2024-36401 (CVSS score: 9.8), a critical

    Read More

  • Linux Malware Delivered via Malicious RAR Filenames Evades Antivirus Detection

    Linux Malware Delivered via Malicious RAR Filenames Evades Antivirus Detection

    Cybersecurity researchers have shed light on a novel attack chain that employs phishing emails to deliver an open-source backdoor called VShell. The “Linux-specific malware infection chain that starts with a spam email with a malicious RAR archive file,” Trellix researcher Sagar Bade said in a technical write-up. “The payload isn’t hidden inside the file content…

    Read More