fp-3a
-
Posted: October 18, 2025Views: 8WaterPlum's Cluster B deploys OtterCandy via ClickFake campaigns—learn about its theft features, v2 updates, and defenses like monitoring Node.js to protect against credential and crypto theft.
-
TikTok videos lure users with fake Photoshop activators, delivering AuroStealer via PowerShell—learn to avoid risky commands, use antivirus, and enable MFA to protect against credential theft.
-
UNC5342 uses EtherHiding to embed malware in smart contracts for credential theft—learn to spot fake jobs, restrict downloads, and bolster defenses against these evolving cyber attacks.
-
LastPass warns of phishing emails with ZIP files dropping malware for keylogging and data theft—enable MFA, use antivirus, and verify sources to protect against these sneaky attacks.
-
UNC5142 exploits WordPress via BNB Smart Chain to spread stealers like Atomic—learn to update sites, use antivirus, and detect anomalies to protect against these evolving cyber attacks.
-
APT group Mysterious Elephant exploits WhatsApp with custom malware for data theft—learn to patch vulnerabilities, monitor networks, and train against phishing to protect from these evolving cyber attacks.
-
Posted: October 14, 2025Views: 23Researcher exposes vulnerability in Worldline Yomani XR's debug port, allowing instant root shell access for malware or network pivots—despite tamper protections. Merchants must patch firmware and audit devices to block this high-risk entry point.
-
Posted: October 14, 2025Views: 19Kandji uncovers a September 2025 campaign where attackers clone Homebrew sites to inject malware like Odyssey Stealer via clipboard tricks—exploit C2 servers and bypass trust; mitigate by verifying sources and using endpoint monitoring.
-
Indian scammers use WhatsApp fake ticket alerts to push RAT-infected mParivahan apps, stealing OTPs, spying via camera, and draining banks. Download from official stores, update OS, use antivirus—report to 1930 if hit to stay safe.
-
New SnakeKeylogger campaign spoofs CPA Global/Clarivate emails with ISO/ZIP lures containing BAT/PowerShell payloads to log keystrokes, hijack clipboard, and exfiltrate data. Persists via "SysUpdate" tasks—train users, sandbox attachments, and monitor PowerShell for defense.