fp-3a
-
Read moreUNC5142 exploits WordPress via BNB Smart Chain to spread stealers like Atomic—learn to update sites, use antivirus, and detect anomalies to protect against these evolving cyber attacks.
-
Read moreAPT group Mysterious Elephant exploits WhatsApp with custom malware for data theft—learn to patch vulnerabilities, monitor networks, and train against phishing to protect from these evolving cyber attacks.
-
Posted: October 14, 2025Views: 123Read moreResearcher exposes vulnerability in Worldline Yomani XR's debug port, allowing instant root shell access for malware or network pivots—despite tamper protections. Merchants must patch firmware and audit devices to block this high-risk entry point.
-
Posted: October 14, 2025Comments: 1Views: 135Read moreKandji uncovers a September 2025 campaign where attackers clone Homebrew sites to inject malware like Odyssey Stealer via clipboard tricks—exploit C2 servers and bypass trust; mitigate by verifying sources and using endpoint monitoring.
-
Read moreIndian scammers use WhatsApp fake ticket alerts to push RAT-infected mParivahan apps, stealing OTPs, spying via camera, and draining banks. Download from official stores, update OS, use antivirus—report to 1930 if hit to stay safe.
-
Read moreNew SnakeKeylogger campaign spoofs CPA Global/Clarivate emails with ISO/ZIP lures containing BAT/PowerShell payloads to log keystrokes, hijack clipboard, and exfiltrate data. Persists via "SysUpdate" tasks—train users, sandbox attachments, and monitor PowerShell for defense.
-
Read moreFortiGuard Labs exposes Chaos ransomware's aggressive C++ upgrade—selective encryption, large file deletion, and Bitcoin wallet swapping via clipboard hijack. This RaaS threat from ex-BlackSuit actors targets big-game hunting; bolster backups and detection to counter faster, multifaceted attacks.
-
Read moreVampire Bot spyware targets job seekers via deceptive ZIP attachments in recruiter emails, stealing screenshots and data. Linked to BatShadow hackers, it evades detection—stay safe by verifying offers and using EDR tools to avoid digital traps.
-
Read moreOpenAI's October 2025 report reveals bans on ChatGPT accounts linked to PRC-affiliated groups like UNKDROPPITCH, who leveraged AI to debug malware (GOVERSHELL, HealthKick), craft targeted phishing, and build surveillance tools—disrupting 40+ networks; models block direct threats but highlight efficiency risks in cyber ops.
-
Read moreSucuri uncovers stealthy PHP code injections in WordPress theme files (functions.php) exploiting weak permissions and outdated plugins to fetch obfuscated JS from brazilc[.]com, enabling pop-ups, redirects, and Cloudflare-mimicking iframes—update themes, tighten permissions, and monitor scripts to secure sites.