Wednesday, May 6, 2026
HomeCyber News

Cyber News

Over 20 Malicious Apps on Google Play Targeting Users to Steal Login Information

A sophisticated phishing campaign targeting cryptocurrency users through more than 20 malicious Android applications distributed via the Google Play Store. These fraudulent apps impersonate popular crypto wallets including SushiSwap, PancakeSwap, Hyperliquid, and Raydium to steal users' sensitive mnemonic phrases, which serve as master keys...

Novel Method for Embedding Digital Images into Text Data via DNS TXT Records

A novel method for storing digital images within Domain Name System (DNS) records has been developed, demonstrating an innovative approach to data storage and retrieval. This technique leverages DNS TXT records, traditionally used for text verification and configuration information, to store encoded image data...

IBM Backup Services Vulnerability Allows Attackers to Escalate Privileges

IBM has disclosed a critical security vulnerability in its Backup, Recovery and Media Services for i platform that could allow attackers to gain elevated privileges and execute malicious code with enhanced system access. The vulnerability, tracked as CVE-2025-33108, affects versions 7.5 and 7.4 of...

KIA Ecuador Keyless Entry Vulnerability Risks Mass Vehicle Theft

A critical security vulnerability discovered in KIA Ecuador vehicles manufactured between 2022 and 2025 has exposed thousands of cars to potential theft through exploitable keyless entry systems. Independent hardware security researcher Danilo Erazo identified that these vehicles use outdated learning code technology instead of...

Internet Identified As Leading Cyber Threat To Industrial Automation Systems, New Report Reveals

New findings from a leading cybersecurity firm’s Q1 2025 report have spotlighted a critical shift in the threat landscape facing Industrial Automation Systems (IAS). The Internet, once a secondary attack vector, has now emerged as the primary source of malicious activity targeting industrial control...

North Korean APT Group Leveraging Social Media for Targeted Malware Delivery Campaigns

A recent investigation into advanced persistent threat activity has revealed a sophisticated attack chain orchestrated by the North Korea-linked Kimsuky group. This operation, running for over two months in early 2025, targeted individuals involved with North Korean defector support, defense circles, and NGOs. The...