#Malware

[ follow ]
#malware
Information security
fromInfoWorld
1 day ago

Self-propagating worm found in marketplaces for Visual Studio Code extensions

GlassWorm infects VS Code and OpenVSX extensions, harvesting developer credentials, deploying proxies and backdoors, draining crypto wallets, and spreading rapidly.
Information security
fromZDNET
1 day ago

TikTok video promising you free Photoshop or Windows license? Don't do it - it's a scam

TikTok is being used to deliver ClickFix social engineering attacks that trick users into running commands to install information-stealing malware like AuroStealer.
fromThe Hacker News
1 week ago

npm, PyPI, and RubyGems Packages Found Sending Developer Data to Discord Channels

Webhooks on Discord are a way to post messages to channels in the platform without requiring a bot user or authentication, making them an attractive mechanism for attackers to exfiltrate data to a channel under their control. "Importantly, webhook URLs are effectively write-only," Socket researcher Olivia Brown said in an analysis. "They do not expose channel history, and defenders cannot read back prior posts just by knowing the URL."
Information security
fromZDNET
2 weeks ago

AI is making cybercriminal workflows more efficient too, OpenAI finds

OpenAI has published research revealing how state-sponsored and cybercriminal groups are abusing artificial intelligence (AI) to spread malware and perform widespread surveillance. (Disclosure: Ziff Davis, ZDNET's parent company, filed an April 2025 lawsuit against OpenAI, alleging it infringed Ziff Davis copyrights in training and operating its AI systems.) AI has benefits in the cybersecurity space; it can automate tedious and time-consuming tasks, freeing up human specialists to focus on complex projects and research, for example.
Information security
Artificial intelligence
fromTechzine Global
2 weeks ago

OpenAI reports growing misuse of AI by states and criminals

OpenAI disrupted international networks using its models for cyberattacks, scams, and political influence while strengthening defenses to block and detect malicious AI use.
Information security
fromIT Pro
3 weeks ago

A new 'top-tier' Chinese espionage group is stealing sensitive data

A China-linked group, Phantom Taurus, conducts covert cyber-espionage against governments, militaries, and critical infrastructure across Africa, the Middle East, and Asia.
Information security
fromTheregister
3 weeks ago

Microsoft spots XCSSET strain hiding in Apple dev projects

XCSSET macOS malware variant targets developers via infected Xcode projects, adding stealthy persistence, obfuscation, Firefox data theft, and crypto clipboard hijacking.
Information security
fromKotaku
4 weeks ago

Malware 'Game' On Steam Stole $32K From Cancer-Stricken Streamer

A malicious update to the Steam game BlockBlasters deployed malware that drained a streamer’s $32,000 in crypto during a cancer fundraiser.
#npm
Information security
fromIT Pro
4 weeks ago

Hackers are disguising malware as ChatGPT, Microsoft Office, and Google Drive to dupe workers

SMBs in Europe and parts of Africa face malware and PUAs disguised as trusted tools, necessitating stronger employee training, authentication, patching, and secure software sourcing.
Information security
fromIT Pro
1 month ago

Mobile app security is a huge blind spot for developer teams - 93% are confident their applications are secure, but 62% reported breaches last year

Organizations overestimate mobile app security readiness despite widespread breaches, accelerated release pressures, and frequent malware, data loss, and credential-theft incidents.
#phishing
fromIT Pro
2 months ago
Privacy professionals

Malicious URLs overtake email attachments as the biggest malware threat

fromIT Pro
2 months ago
Privacy professionals

Malicious URLs overtake email attachments as the biggest malware threat

Information security
fromTheregister
1 month ago

Double trouble with CastleRAT malware, now in C and Python

TAG-150 created CastleRAT in Python and C, using ClickFix social engineering to trick users into pasting commands that enable remote access and payload delivery.
Information security
fromWIRED
1 month ago

Automated Sextortion Spyware Takes Webcam Pics of Victims Watching Porn

Stealerium automates sextortion by detecting porn browsing, screenshotting tabs, capturing webcam photos, and exfiltrating images alongside stolen credentials for blackmail.
Information security
fromZDNET
1 month ago

Why you should delete your browser extensions right now - or do this to stay safe

Malicious browser extensions infect millions, disable security features, and present significant privacy and performance risks even when they appear vetted.
Artificial intelligence
fromTechzine Global
1 month ago

Anthropic blocks misuse of Claude for cybercrime

Anthropic blocked attempts to misuse Claude for phishing, malware development, filter circumvention, and influence campaigns, banning accounts and tightening filters to mitigate risks.
#insider-threat
fromTheregister
2 months ago

Apache ActiveMQ attackers patch critical vuln after entry

After installing a backdoor to the infected systems, they then downloaded two Java Archive (JAR) files that effectively patched the original vuln.
Information security
#cybersecurity
fromThe Hacker News
2 months ago

Noodlophile Malware Campaign Expands Global Reach with Copyright Phishing Lures

The Noodlophile campaign, active for over a year, now leverages advanced spear-phishing emails posing as copyright infringement notices, tailored with reconnaissance-derived details like specific Facebook Page IDs and company ownership information.
Information security
Privacy professionals
fromThe Hacker News
2 months ago

Taiwan Web Servers Breached by UAT-7237 Using Customized Open-Source Hacking Tools

A Chinese-speaking APT actor, UAT-7237, targets web infrastructure in Taiwan using customized open-source tools for prolonged access.
#ransomware
Ruby on Rails
fromThe Hacker News
2 months ago

RubyGems, PyPI Hit by Malicious Packages Stealing Credentials, Crypto, Forcing Security Changes

60 malicious RubyGems packages target unsuspecting users, posing as automation tools to steal credentials.
Privacy technologies
fromThe Hacker News
2 months ago

SocGholish Malware Spread via Ad Tools; Delivers Access to LockBit, Evil Corp, and Others

SocGholish malware utilizes Traffic Distribution Systems to redirect users to malicious content and has a Malware-as-a-Service model for cybercriminal operations.
Python
fromThe Hacker News
2 months ago

Webinar: How to Stop Python Supply Chain Attacks-and the Expert Tools You Need

Python packages harbor risks due to rising supply chain attacks, notably through various exploitation techniques like typo-squatting and repo-jacking.
Privacy professionals
fromWIRED
2 months ago

A Single Poisoned Document Could Leak 'Secret' Data Via ChatGPT

Generative AI models can be configured to access personal data sources, posing serious security risks and vulnerabilities to sensitive information.
fromThe Hacker News
2 months ago

ClickFix Malware Campaign Exploits CAPTCHAs to Spread Cross-Platform Infections

"Like a real-world virus variant, this new 'ClickFix' strain quickly outpaced and ultimately wiped out the infamous fake browser update scam that plagued the web just last year."
Privacy professionals
Privacy professionals
fromBoston.com
2 months ago

Emergency communications on South Shore targeted by cyber attack

The South Shore Regional Emergency Communications Center was targeted in a cyber attack, rendering its dispatch software unusable but not disrupting 911 services.
#cyber-espionage
#coyote-trojan
US politics
fromArs Technica
3 months ago

Ukrainians arrest alleged admin of major crime forum XSS

Ukrainian authorities arrested the suspected administrator of the Russian-language crime forum XSS.is, a key player in global cybercrime.
fromThe Hacker News
3 months ago

Critical Unpatched SharePoint Zero-Day Actively Exploited, Breaches 75+ Global Organizations

A critical security vulnerability in Microsoft SharePoint Server, tracked as CVE-2025-53770 with a CVSS score of 9.8, has been weaponized in a large-scale exploitation campaign.
Information security
fromThe Hacker News
3 months ago

Google Sues 25 Chinese Entities Over BADBOX 2.0 Botnet Affecting 10M Android Devices

"The BADBOX 2.0 botnet compromised over 10 million uncertified devices running Android's open-source software (Android Open Source Project), which lacks Google's security protections."
Privacy professionals
fromArs Technica
3 months ago

Google finds custom backdoor being installed on SonicWall network devices

The targeted devices are end of life, meaning they no longer receive regular updates for stability and security. Despite the status, many organizations continue to rely on them.
Privacy technologies
[ Load more ]