June 4, 2025

Crocodilus Malware Adds Fake Contacts to Your Android Phone

The newly discovered Crocodilus malware raises serious concern among cybersecurity experts. Unlike typical trojans, this malware introduces a deceptive twist: it secretly adds fake contacts to your phone to impersonate trusted names like banks, family members, or service providers. This manipulation makes phishing attempts feel far more convincing, and far more dangerous. Here's what you need to know about how

Crocodilus Malware
May 27, 2025

Bumblebee Malware Returns with SEO Poisoning Campaign

Bumblebee malware has re-emerged with a clever and concerning new distribution method. Threat actors are now using search engine optimization (SEO) poisoning to push trojanized versions of trusted networking tools like Zenmap and WinMTR, successfully deceiving even tech-savvy users into downloading malicious software. This campaign underscores the growing sophistication of cyber threats and the need for constant vigilance. What Is

Bumblebee Malware Returns
May 26, 2025

TikTok Videos Spread Malware via ClickFix Attacks

TikTok, the go-to platform for viral dances, life hacks, and bite-sized entertainment, has now entered the radar of cybersecurity experts for a far more sinister reason. A recent report from Trend Micro reveals that cybercriminals are using TikTok videos to spread infostealer malware in a new and deceptive tactic known as "ClickFix." What Is ClickFix? ClickFix is a social engineering

TikTok Videos Spread Malware
May 23, 2025

Malicious Chrome Extensions Are Stealing Your Data

In a new and alarming cybersecurity report, over 100 malicious Google Chrome extensions have been discovered impersonating trusted tools like Fortinet VPN, YouTube downloaders, and AI services. These deceptive extensions were designed not only to lure users with familiar branding, but also to steal sensitive browser data and inject remote scripts. This poses a major threat to anyone using the

malicious chrome extensions steal data
May 20, 2025

RVTools Website Hacked to Spread Bumblebee Malware

In a concerning case of software supply chain compromise, the official RVTools website was hacked to distribute malware. RVTools is a trusted utility used by VMware administrators. The installer, normally used to help IT professionals audit virtual environments, was tampered with to deliver the Bumblebee malware loader, a known precursor to ransomware attacks. This incident underscores the persistent and growing

RVTools Website Hacked
May 19, 2025

Skitnet Malware Fuels Ransomware Attacks

Ransomware gangs are evolving fast, and their newest weapon, Skitnet malware, proves it. Known alternately as “Bossnet,” this emerging post-exploitation malware is gaining traction among threat actors like BlackBasta and Cactus. Designed for stealth, Skitnet leverages in-memory execution, DNS-based command and control, and anti-forensics to maintain a low profile while enabling persistent remote access. As its use spreads in phishing

skitnet malware
May 16, 2025

Procolored Distributed Malware-Laced Drivers for Half a Year

In an alarming cybersecurity lapse, popular printer brand Procolored has unknowingly distributed malware-infected drivers via its official website for at least six months. The infected software included a Remote Access Trojan (RAT) called XRedRAT and a cryptocurrency stealer known as SnipVex, both capable of compromising user systems and exfiltrating sensitive data. What Happened? The malware was embedded in driver installation

Procolored Distributed Malware-Laced Drivers
May 13, 2025

DoppelPaymer Ransomware Suspect Arrested in Moldova

DoppelPaymer Ransomware suspect was arrested. In a significant blow to the global ransomware ecosystem, Moldovan authorities have seized a 45-year-old foreign national. He is suspected of playing a central role in the notorious DoppelPaymer ransomware attacks. The arrest, carried out on May 6, 2025, follows a coordinated operation with Dutch law enforcement and is part of a broader international effort

DoppelPaymer Ransomware Suspect Arrested
May 12, 2025

Hackers Hiding Malware in JPEG in a New Wave of Attacks

In today’s cybersecurity landscape, even the most ordinary-looking files can be vehicles for sophisticated attacks. Recent findings have exposed a new method used by cybercriminals - hackers hiding malware in JPEG files to bypass security systems. This technique, known as steganography, allows attackers to hide harmful scripts inside files that appear completely harmless, turning images into a serious cybersecurity threat.

Hackers Hiding Malware in JPEG
May 12, 2025

Fake AI Apps: Cybercriminals Trick Users and Spread Malware

As AI tools skyrocket in popularity, they’re attracting more than just curious users and developers. Cybercriminals are seizing the moment, creating fake AI apps that promise powerful capabilities. They instead deliver something far more sinister: malware. Disguised as legitimate AI-powered platforms, these deceptive tools are being promoted through social media, especially Facebook, and are tricking thousands of users into downloading

Fake AI Apps Spread Malware