fp-3a

  1. Microsoft Warns: Hackers Exploit Teams Features Across Attack Chain for Malware and Ransomware Delivery
  2. CometJacking: New Attack Hijacks Perplexity’s Comet AI Browser for Covert Data Exfiltration
  3. Malicious Postmark-MCP Server Steals Emails via Hidden BCC in AI-Powered Workflows
  4. Evolved XCSSET Malware Targets macOS Developers: Clipboard Hijacking, Firefox Theft, and Xcode Infections
  5. Hackers Weaponize AI-Generated Code to Obfuscate Phishing Payloads in SVG Files, Bypassing Traditional Defenses
  6. Hackers Bypass EDR with In-Memory PE Loader: Fileless Execution in Trusted Processes
  7. Banking Trojans Disguise as Government Apps to Target Android Users in Indonesia and Vietnam
  8. Threat Actors Breach Enterprises in 18 Minutes: ReliaQuest Reveals Oyster Malware's Rapid Evasion Tactics
  9. New npm Malware "fezbox" Steals Browser Passwords via Steganographic QR Code
  10. Beware Fake Speedtest Apps: Hidden JavaScript Malware Steals Data and Enables Remote Control
Back to Top