Malware Alerts
-
Posted: June 17, 2025Views: 24A fraudulent loan app, "RapiPlata," has infected over 150,000 iOS and Android devices, stealing sensitive data and threatening users. Learn about the app's malicious tactics and ongoing risks.
-
GreyNoise warns of coordinated brute-force attacks on Apache Tomcat Manager interfaces, involving 295 malicious IPs. Learn about the risks and recommended security measures.
-
A new malware campaign disguised as an Instagram growth tool is stealing login credentials. Learn how "imad213" works and how to protect your account.
-
Posted: June 11, 2025Views: 16FIN6 cybercrime group uses fake resumes hosted on AWS to deliver More_eggs malware via LinkedIn. Learn how they target recruiters and evade detection.
-
Posted: June 10, 2025Views: 21Discover how a China-linked cyber espionage group, including APT15 and UNC5174, targeted over 70 organizations across government, media, and other sectors. Learn about the malware used, including ShadowPad and GoReShell, and the exploited vulnerabilities.
-
Cybersecurity experts reveal a significant supply chain attack affecting npm and PyPI ecosystems, compromising numerous packages and exposing millions of users to malware. Learn about the affected packages and how to protect yourself.
-
The latest variant of DarkCloud Stealer uses AutoIt scripting and advanced evasion techniques to target financial, healthcare, and e-commerce sectors. With over 120,000 accounts compromised since March 2025, this malware showcases a dangerous blend of legacy scripting abuse and stealthy credential theft.
-
Cybercriminals have devised an alarming new tactic by hiding malware in Google Calendar invites using invisible Unicode characters. This stealthy technique enables the delivery of malicious payloads through trusted platforms—bypassing traditional security mechanisms with a single deceptive character.
-
Cybercriminals are now leveraging steganography to hide ransomware in ordinary JPG image files, deploying Fully Undetectable (FUD) malware that bypasses traditional security solutions. These advanced tactics exploit metadata and pixel data to deliver multi-stage attacks — silently and effectively.
-
As tensions escalate in the wake of the Pahalgam attack, India’s digital frontline is now under coordinated cyber assault. The government’s Computer Emergency Response Team (CERT-In) has issued urgent advisories, calling for heightened vigilance across banks, strategic sectors, and private enterprises. The increased threat environment has prompted a nationwide effort—public and private—to fortify cyber defenses under Operation Sindoor.