Cybersecurity researchers have identified a sophisticated malware campaign utilizing malicious Windows shortcut (LNK) files to deliver the REMCOS backdoor, demonstrating how threat actors continue to evolve their tactics to bypass security measures.
The attack, identified through analysis of the file "ORDINE-DI-ACQUIST-7263535" (SHA256: 506ecb76cf8e39743ec06129d81873f0e4c1ebfe7a352fc5874d0fc60cc1d7c6), showcases...
In a rapidly evolving cybercrime landscape, a new information-stealing malware dubbed Raven Stealer has emerged, directly targeting Windows users and leveraging Telegram for real-time data exfiltration.
First identified in July 2025 and actively distributed via GitHub and dedicated Telegram channels, this sophisticated Delphi/C++ malware lowers the barrier for even novice...
The Node.js ecosystem faced a critical supply chain attack this week as several popular npm packages, including eslint-config-prettier and eslint-plugin-prettier were compromised through a coordinated phishing campaign.
The breach highlights growing concerns about the security of open-source maintainers. It highlights the ease with which credentials can be...
Cybersecurity researchers at AhnLab Security Intelligence Center (ASEC) have identified a sophisticated campaign targeting poorly secured Linux servers through SSH brute force attacks, deploying a Python-based DDoS botnet called SVF Bot that leverages Discord as its command-and-control infrastructure.
Discord-Powered Botnet Architecture
The SVF Botnet represents a...
Iranian state-sponsored cyber groups have significantly enhanced their offensive capabilities in the aftermath of June 2025 military strikes, deploying sophisticated AI-crafted phishing campaigns that specifically target cybersecurity researchers and academic institutions.
The escalation represents a concerning evolution in Tehran's cyber warfare tactics, with Advanced...
Cybersecurity researchers have uncovered a sophisticated new attack campaign where threat actors are weaponizing Scalable Vector Graphics (SVG) files to deliver malicious JavaScript payloads and redirect unsuspecting users to attacker-controlled infrastructure.
This emerging technique exploits the trusted nature of image files to bypass traditional...