Cyber News

Unleashing Threats – DeepSeek Installers Spread Sainbox RAT and Concealed Rootkit

A sophisticated new malware campaign has been uncovered by Netskope Threat Labs, targeting Chinese users through fake installers for popular…

10 months ago

How Cybercriminals Are Exploiting CapCut’s Popularity to Steal Apple IDs and Credit Card Info

As CapCut continues to surge in popularity as the go-to short-form video editing tool, cybercriminals are now weaponizing its brand…

10 months ago

Windows Shutdowns Triggered by Invalid Inputs in Malicious passlib Python Package

Security researchers at Socket have uncovered a malicious Python package that exploits developer trust and system integration to compromise Windows…

10 months ago

Clickfix Tactics – How Threat Actors Use Malicious AppleScripts to Harvest Login Credentials

Recent cybersecurity research has exposed a sophisticated malware campaign targeting macOS users through a technique dubbed “Clickfix.” This attack leverages…

10 months ago

Malware Persistence – Exploiting Windows Task Scheduler for Stealthy Control

A recent investigation by the FortiGuard Incident Response Team (FGIR) has revealed a sophisticated campaign targeting critical national infrastructure (CNI)…

10 months ago

Instagram Implements 1-Week Validity TLS Certificates, Renewed Daily

Instagram implements an unusual certificate management strategy, replacing their TLS certificates on a daily basis using certificates with approximately one-week…

10 months ago

500% Surge in ClickFix Attacks – Hackers Exploit New Trick to Deceive Users

In the first half of 2025, cybersecurity experts observed an unprecedented surge in innovative threats, increasing the risk to organizations…

10 months ago

Next.js Cache Poisoning Vulnerability Let Attackers Trigger DoS Condition

A critical security vulnerability has been identified and patched in Next.js, the popular React-based web framework. The vulnerability, designated as…

10 months ago

APT-C-36 – Cyber Assaults Targeting Government, Financial, and Critical Infrastructure Sectors

Since 2018, the advanced persistent threat group known as APT-C-36, or Blind Eagle, has been waging a relentless cyber assault…

10 months ago

Writable File in Lenovo Windows Directory Allows Stealthy AppLocker Bypass

A significant vulnerability affecting Lenovo machines that allows users to bypass AppLocker security controls through a writeable file located in…

10 months ago