More

    Exploits

    Macs under attack from dangerous new info-stealing malware — how to stay safe

    (Image credit: Tom's Guide) ‘Shamos’ is a new infostealer that's being used to target vulnerable Macs but it's also the latest in a long list...

    Proxyware Malware Poses as YouTube Video Download Site, Delivering Malicious JavaScript

    Cybersecurity researchers at AhnLab Security Intelligence Center (ASEC) have uncovered a persistent campaign where attackers distribute proxyware malware through fake YouTube video download pages....

    Ransomware attack confirmed by Data I/O

    Major U.S. electronics manufacturer Data I/O which counts Microsoft, Google, Amazon, and Tesla among its clients had its important operational systems disrupted by a...

    Updated Anatsa malware adds stealth, persistence

    More than 800 financial organizations around the world have been targeted by new attack campaigns involving the latest iteration of the Anatsa Android banking...

    Novel BQTLOCK RaaS operation examined

    Newly emergent BQTLock ransomware-as-a-service which has been associated with alleged pro-Palestinian hacktivist group Liwaa Mohammed's leader ZerodayX has already gained a new variant with...

    Proxyware Malware Mimic as YouTube Video Download Site Delivers Malicious Javascripts

    Cybersecurity researchers have observed a surge in deceptive sites masquerading as YouTube video download services to deliver Proxyware malware in recent weeks. Victims seeking...

    Ongoing APT36 malware attacks involve Linux .desktop files

    BleepingComputer reports that Indian government and defense organizations have been targeted by Pakistan-linked threat operation APT36, also known as Transparent Tribe, in attacks involving...

    New macOS Installer Boasts Lightning-Fast Data Theft, Marketed on Dark Web

    A novel macOS infostealer malware, designated as Mac.c, has emerged as a formidable contender in the underground malware-as-a-service (MaaS) ecosystem. Developed openly by a...

    Pakistan-linked APT36 abuses Linux .desktop files to drop custom malware in new campaign

    Pierluigi Paganini August 25, 2025 Transparent Tribe (aka APT36, Operation C-Major, and Mythic Leopard), a Pakistan-linked threat actor, is using Linux .desktop files to...

    Latest articles