malware
-
New Tool ‘Defendnot’ Manipulates Windows Security to Disable Microsoft Defender
The newly developed tool ‘Defendnot’ exploits a Windows Security API to disable Microsoft Defender by masquerading as a fake antivirus product, raising significant security concerns about system manipulations.
-
Rising Threat: Fake AI Tools Spread Noodlophile Malware
A new wave of malware known as Noodlophile is being spread through counterfeit AI tools, misleading users into downloading malicious software under the guise of legitimate AI services.
-
FBI Warns of Cybercriminal Exploitation of Outdated Routers
The FBI has issued a warning on the exploitation of end-of-life routers by cybercriminals who deploy malware to convert them into proxies for illicit activities. The advisory identifies several vulnerable router models, urging consumers to consider upgrading to secure alternatives.
-
Russian Hackers Deploy New LOSTKEYS Malware Using ClickFix Tactics
The Russian hacking group COLDRIVER has introduced LOSTKEYS, a new malware targeting Western advisors, journalists, and NGOs through deceptive tactics resembling ClickFix methods.
-
Urgent Measures Required as Samsung MagicINFO 9 Server Vulnerability Under Attack
A critical vulnerability in the Samsung MagicINFO 9 Server is being actively exploited by hackers to execute remote code and deploy malware, emphasizing the urgent need for system upgrades.
-
Golden Chickens Malware Developments: New Threats Emerge with TerraStealerV2 and TerraLogger
The Golden Chickens hacking group is behind the emergence of two new malware families, TerraStealerV2 and TerraLogger, signaling ongoing refinement of their capabilities. TerraStealerV2 is engineered to harvest sensitive data, while TerraLogger operates as a standalone keylogger, raising alarms among cybersecurity researchers.
-
Cybersecurity Alert: Malicious Go Modules Found Overwriting Linux Disks
Cybersecurity researchers have identified three malicious Go modules that can overwrite Linux systems’ primary disks, rendering them unbootable. These modules pose a significant threat, especially amid increasing supply chain attacks targeting software packages.
-
China-Aligned Threat Actor Exploits IPv6 to Hijack Software Updates
TheWizards, a China-aligned APT group, has been exploiting IPv6 protocol vulnerabilities to hijack software updates, deploying malicious tools that facilitate ongoing access to infected systems.
-
Cybercriminals Target Email Systems with Evolving Phishing Tactics in 2025
In 2025, cybercriminals are increasingly using low-tech and human-centric tactics to penetrate email security systems, with the rise of callback phishing and phishing attacks featuring malicious SVG file attachments. This trend highlights the need for businesses to reassess their email security strategies.