fp-3b
-
Posted: July 25, 2025Views: 23A new malware campaign exploits users' trust in financial institutions by using weaponized LNK files disguised as credit card security emails. Learn how this sophisticated attack operates.
-
The Coyote banking Trojan, active since February 2024, is the first malware to exploit the Windows UI Automation framework, targeting banks and crypto exchanges in Brazil. Learn how it operates and the risks involved.
-
A new variant of the macOS.ZuRu malware exploits a compromised Termius SSH client to turn developer workstations into remote access points. Learn about the risks and how to protect your systems.
-
Novabev Group confirmed a ransomware attack on July 14, 2025, disrupting operations and IT infrastructure. The company refuses to pay ransom and assures customer data remains secure.
-
A sophisticated phishing campaign is targeting Node.js developers through a typosquatted domain, npnjs.com. Learn how attackers are impersonating the npm package registry and what you can do to protect your credentials.
-
Cybersecurity researchers have uncovered a new attack method by the PoisonSeed group that exploits FIDO key protections through QR phishing and cross-device sign-in. Learn how this technique deceives users and compromises account security.