malware

CISA and NSA Alert Organizations To BRICKSTORM Malware Targeting VMware ESXi and Windows Systems

CISA, NSA, and the Canadian Centre for Cyber Security released a joint Malware Analysis Report on December 4, 2025, warning…

5 months ago

KawaiiGPT: A Free Alternative To WormGPT Using DeepSeek, Gemini And Kimi-K2 AI

KawaiiGPT is an open‑source “kawaii” command‑line chatbot that aims to offer WormGPT‑style, unrestricted AI assistance for free by chaining together…

5 months ago

Dead Man’s Switch–Triggered npm Supply Chain Attack Fuels Widespread Malware Campaigns

GitLab's Vulnerability Research team has uncovered an active, large-scale supply chain attack spreading destructive malware through the npm ecosystem using…

5 months ago

Cobalt Strike 4.12 Debuts New Injection Methods, Improved UAC Bypasses, and Expanded Malleable C2 Controls

Cobalt Strike 4.12 launched on November 24, 2025, bringing major updates for red team operators, including a refreshed graphical user…

5 months ago

Shai-Hulud 2.0 Rampage: 800+ NPM Packages Trojanized, 25,000+ GitHub Repos Infected In Supply Chain Onslaught

Developers woke to alarms on November 24, 2025, as Shai-Hulud malware resurfaced in a bolder attack. This "Second Coming" affected…

5 months ago

Zapier’s NPM Account Compromised, Multiple Packages Infected With Malware

Cyber attackers compromised Zapier's NPM account in late November 2025, infecting multiple packages as part of the Shai-Hulud 2.0 malware…

5 months ago

UNC2891 Hackers Exploit Raspberry Pi and Cloned Cards To Drain ATM Cash

A tiny Raspberry Pi device, no bigger than a credit card, has emerged as a deadly weapon in modern ATM…

5 months ago

Operation Endgame Takes Down 1,025 Servers Linked To Rhadamanthys, VenomRAT, and Elysium

In a sweeping crackdown on cybercrime infrastructure, international law enforcement agencies dismantled key components of three prominent malware families during…

6 months ago

LeakyInjector And LeakyStealer Malware Steal Crypto, Browsing Data

A new two-stage malware family has emerged, targeting cryptocurrency enthusiasts and everyday users alike. Dubbed LeakyInjector and LeakyStealer by researchers…

6 months ago

Hackers Abuse OneDrive.exe DLL Sideloading To Run Malicious Code

Threat actors are exploiting OneDrive.exe through DLL sideloading to inject and execute malicious code, leveraging the trusted Microsoft application for…

6 months ago