Crocodilus Malware Adds Fake Contacts to Your Android Phone
The newly discovered Crocodilus malware raises serious concern among cybersecurity experts. Unlike typical trojans, this malware introduces a deceptive twist: it secretly adds fake contacts to your phone to impersonate trusted names like banks, family members, or service providers. This manipulation makes phishing attempts feel far more convincing, and far more dangerous. Here's what you need to know about how

Bumblebee Malware Returns with SEO Poisoning Campaign
Bumblebee malware has re-emerged with a clever and concerning new distribution method. Threat actors are now using search engine optimization (SEO) poisoning to push trojanized versions of trusted networking tools like Zenmap and WinMTR, successfully deceiving even tech-savvy users into downloading malicious software. This campaign underscores the growing sophistication of cyber threats and the need for constant vigilance. What Is

TikTok Videos Spread Malware via ClickFix Attacks
TikTok, the go-to platform for viral dances, life hacks, and bite-sized entertainment, has now entered the radar of cybersecurity experts for a far more sinister reason. A recent report from Trend Micro reveals that cybercriminals are using TikTok videos to spread infostealer malware in a new and deceptive tactic known as "ClickFix." What Is ClickFix? ClickFix is a social engineering

Malicious Chrome Extensions Are Stealing Your Data
In a new and alarming cybersecurity report, over 100 malicious Google Chrome extensions have been discovered impersonating trusted tools like Fortinet VPN, YouTube downloaders, and AI services. These deceptive extensions were designed not only to lure users with familiar branding, but also to steal sensitive browser data and inject remote scripts. This poses a major threat to anyone using the

RVTools Website Hacked to Spread Bumblebee Malware
In a concerning case of software supply chain compromise, the official RVTools website was hacked to distribute malware. RVTools is a trusted utility used by VMware administrators. The installer, normally used to help IT professionals audit virtual environments, was tampered with to deliver the Bumblebee malware loader, a known precursor to ransomware attacks. This incident underscores the persistent and growing

Skitnet Malware Fuels Ransomware Attacks
Ransomware gangs are evolving fast, and their newest weapon, Skitnet malware, proves it. Known alternately as “Bossnet,” this emerging post-exploitation malware is gaining traction among threat actors like BlackBasta and Cactus. Designed for stealth, Skitnet leverages in-memory execution, DNS-based command and control, and anti-forensics to maintain a low profile while enabling persistent remote access. As its use spreads in phishing

Procolored Distributed Malware-Laced Drivers for Half a Year
In an alarming cybersecurity lapse, popular printer brand Procolored has unknowingly distributed malware-infected drivers via its official website for at least six months. The infected software included a Remote Access Trojan (RAT) called XRedRAT and a cryptocurrency stealer known as SnipVex, both capable of compromising user systems and exfiltrating sensitive data. What Happened? The malware was embedded in driver installation

DoppelPaymer Ransomware Suspect Arrested in Moldova
DoppelPaymer Ransomware suspect was arrested. In a significant blow to the global ransomware ecosystem, Moldovan authorities have seized a 45-year-old foreign national. He is suspected of playing a central role in the notorious DoppelPaymer ransomware attacks. The arrest, carried out on May 6, 2025, follows a coordinated operation with Dutch law enforcement and is part of a broader international effort

Hackers Hiding Malware in JPEG in a New Wave of Attacks
In today’s cybersecurity landscape, even the most ordinary-looking files can be vehicles for sophisticated attacks. Recent findings have exposed a new method used by cybercriminals - hackers hiding malware in JPEG files to bypass security systems. This technique, known as steganography, allows attackers to hide harmful scripts inside files that appear completely harmless, turning images into a serious cybersecurity threat.

Fake AI Apps: Cybercriminals Trick Users and Spread Malware
As AI tools skyrocket in popularity, they’re attracting more than just curious users and developers. Cybercriminals are seizing the moment, creating fake AI apps that promise powerful capabilities. They instead deliver something far more sinister: malware. Disguised as legitimate AI-powered platforms, these deceptive tools are being promoted through social media, especially Facebook, and are tricking thousands of users into downloading
