Fake Chrome Installers Deliver ValleyRAT Malware

Fake Chrome Installers Deliver ValleyRAT Malware

Threat Actor "Silver Fox" Targets Sensitive Roles in Organizations Cybercriminals are using fake websites pretending to offer Google Chrome downloads to spread a dangerous remote access trojan called ValleyRAT Malware. This malware, first identified in 2023, is linked to a threat group known as…


0 Comments3 Minutes

North Korean Hackers Using Fake Job Offers to Spread Malware

North Korean Hackers Using Fake Job Offers to Spread Malware

North Korean Hackers: How the Scam Works A hacking group linked to North Korean Hackers, known as Lazarus, is running a new scam that uses fake job offers on LinkedIn. They’re targeting people in the cryptocurrency and travel industries, spreading malware that can infect computers running Windows,…


0 Comments4 Minutes

Android Update

Android Update Fixes 47 Security Bugs

Major Security Android Update Google has rolled out security patches to address 47 vulnerabilities in the Android operating system. Among these, one flaw—CVE-2024-53104—is already being actively used in cyberattacks, according to the company. You might be interested in: DeepSeek’s Database Leak…


0 Comments2 Minutes

DeepSeek's Database Leak Raises Security Concerns

DeepSeek’s Database Leak Raises Security Concerns

AI Firm DeepSeek Exposed Sensitive Data Online A major security lapse at the Chinese AI company DeepSeek recently came to light after researchers discovered an open database that could have allowed hackers to access sensitive information. You might be interested in: Cyberattack Hits DeepSeek,…


0 Comments4 Minutes

Apple M-Series Chips Hit by New Exploits

Apple M-Series Chips Hit by New Exploits

Researchers Reveal Two New Vulnerabilities in Apple Processors Security researchers from Georgia Institute of Technology and Ruhr University Bochum have uncovered two new side-channel attacks that target Apple Silicon processors. These attacks could be used to steal sensitive data from web browsers…


0 Comments5 Minutes

Apple Delivers Urgent Security Patches

Critical CoreMedia Bug Apple has released new software updates to fix several security problems found across its products. One of these flaws, called CVE-2025-24085, is a zero-day bug in the CoreMedia feature. This bug allows an already-installed malicious app on a device to gain higher-level…


0 Comments4 Minutes

Cyberattack Hits DeepSeek, Signups Restricted

Cyberattack Hits DeepSeek, Signups Restricted

Rapid Growth of DeepSeek's AI Platform DeepSeek, a fast-growing Chinese AI company, announced on Monday that it will temporarily halt new user registrations due to a wave of cyberattacks targeting its platform. The decision comes as the company continues to gain momentum in the competitive AI…


0 Comments3 Minutes

New Malware Campaign Uses Fake CAPTCHAs to Spread Lumma Stealer

New Malware Campaign Uses Fake CAPTCHAs to Spread Lumma Stealer

Cybersecurity experts have discovered a new malware campaign that tricks users into installing the Lumma information stealer. The criminals behind this scheme are using fake CAPTCHA pages, which appear on compromised websites and prompt people to carry out specific steps that ultimately infect…


0 Comments4 Minutes

Former CIA Analyst Pleads Guilty to Leaking Classified Information

Former CIA Analyst Pleads Guilty to Leaking Classified Information

A former CIA analyst, Asif William Rahman, has pleaded guilty to leaking highly classified National Defense Information (NDI) to unauthorized individuals. Rahman, aged 34 from Vienna, Virginia, worked for the CIA since 2016 and had access to sensitive government documents, including those marked…


0 Comments4 Minutes

Hackers Use cnPilot Flaw for DDoS Attacks

Hackers Use cnPilot Flaw for DDoS Attacks

A new variation of the AISURU botnet, called AIRASHI, has been discovered by cybersecurity firm QiAnXin XLab. The botnet is exploiting a previously unknown vulnerability in Cambium Networks' cnPilot routers to carry out massive distributed denial-of-service (DDoS) attacks. This vulnerability was…


0 Comments5 Minutes