cybersecurity threats
-
The Prometei botnet has resurfaced, targeting Linux servers for cryptocurrency mining and credential theft. Discover the sophisticated techniques used in this malware operation and how it poses a threat to enterprise infrastructure.
-
Posted: June 19, 2025Views: 5A new malware strain called SuperCard exploits hacked Android phones to steal payment card data during contactless transactions. Learn about its infection mechanism and the growing threat to mobile payment security.
-
A new malware campaign exploits Discord's invite system to deliver AsyncRAT and Skuld Stealer, targeting crypto wallets. Learn how attackers hijack links and the risks involved.
-
Posted: June 10, 2025Views: 12Learn about a critical vulnerability in Google's account recovery system that allowed attackers to access any user's phone number through a brute-force attack, highlighting the importance of security audits for legacy systems.
-
Discover how two separate botnets exploit the critical Wazuh Server vulnerability (CVE-2025-24016) to launch Mirai-based DDoS attacks, targeting IoT devices and highlighting the urgency of cybersecurity measures.
-
Cybersecurity experts reveal a significant supply chain attack affecting npm and PyPI ecosystems, compromising numerous packages and exposing millions of users to malware. Learn about the affected packages and how to protect yourself.
-
A sophisticated cyberattack has crippled Uttarakhand's IT infrastructure, rendering over 90 government websites, including the CM helpline, non-functional. This unprecedented breach has halted essential online services and internal operations across the state, with cybersecurity experts working tirelessly to restore the systems.