Monday, May 4, 2026
HomeTagsMalware

Tag: malware

Stay Alert – Fake CAPTCHA Pop-ups Are Covertly Installing LightPerlGirl Malware

In an era where cyber threats evolve with alarming frequency, a new malware strain dubbed LightPerlGirl is making waves as it exploits users’ trust in web CAPTCHA systems. Security researchers at Todyl have uncovered a sophisticated attack chain that leverages fake CAPTCHA pop-ups to trick users...

Cybercriminals Exploit ClickFix Method to Spread Remote Access Trojans and Data-Siphoning Malware

Security researchers have recently uncovered a worrying surge in cyberattacks leveraging the “ClickFix” technique, a sophisticated social engineering method designed to trick users into unwittingly executing malicious code on their own devices. According to the latest intelligence from Elastic Security Labs, cybercriminals are increasingly...

Hidden Dangers – How Weaponized Research Papers Deliver Malware Through Password-Protected Files

The sophistication of cyberattacks continues to climb, with threat actors now leveraging something as innocuous as academic research papers to infect unsuspecting victims. The recent discovery by AhnLab Security Intelligence Center (ASEC) highlights a new campaign by the notorious Kimsuky group, which has been targeting...

Uncovering Hidden Malware in JPEGs Using Steganography and Base64

Security researchers continually refine their tactics to detect the latest malware delivery methods. One increasingly common technique is the use of steganography to hide malicious payloads within seemingly innocuous files, such as images. This article explores a real-world case where malware was concealed within...

New Secure Boot Vulnerability Allows Attackers to Install Malware in PC and Server Boot Processes

Security researchers from Binarly have uncovered a major software vulnerability in the Unified Extensible Firmware Interface (UEFI) ecosystem, specifically impacting the Secure Boot mechanism used by almost all modern PCs and servers. Dubbed CVE-2025-3052 (BRLY-2025-001), this memory corruption flaw enables attackers to execute unsigned code...

Over 20 Malicious Apps on Google Play Targeting Users to Steal Login Information

A sophisticated phishing campaign targeting cryptocurrency users through more than 20 malicious Android applications distributed via the Google Play Store. These fraudulent apps impersonate popular crypto wallets including SushiSwap, PancakeSwap, Hyperliquid, and Raydium to steal users' sensitive mnemonic phrases, which serve as master keys...