Skip to content
InfosecToday.com
  • Cybersecurity Glossary
InfosecToday.com

Obfuscation 

CAPTCHAgeddon – A New ClickFix Attack Uses Phony CAPTCHA to Distribute Malware
Browser-Based Attacks | Cross-Platform Threats  | Malware Campaigns

CAPTCHAgeddon – A New ClickFix Attack Uses Phony CAPTCHA to Distribute Malware

Malicious actors exploit smart contracts to siphon over $900,000 from user cryptocurrency wallets.
Cybersecurity Threats | Ethereum Scams | Smart Contract Obfuscation 

Malicious actors exploit smart contracts to siphon over $900,000 from user cryptocurrency wallets.

North Korean cybercriminals are exploiting NPM packages to pilfer cryptocurrency and confidential information.
Cybersecurity Threats | Malware Distribution | Supply Chain Attacks

North Korean cybercriminals are exploiting NPM packages to pilfer cryptocurrency and confidential information.

Raspberry Robin malware downloader is targeting Windows systems by utilizing a new exploit related to a frequently used vulnerability in the Log File System Driver.
Evasion Strategies  | Exploitation Techniques | Malware Threats 

Raspberry Robin malware downloader is targeting Windows systems by utilizing a new exploit related to a frequently used vulnerability in the Log File System Driver.

Malicious actors are currently taking advantage of weaknesses in the open-source ecosystem to distribute harmful software.
Cybersecurity Threats | Malicious Software Techniques  | Supply Chain Vulnerabilities

Malicious actors are currently taking advantage of weaknesses in the open-source ecosystem to distribute harmful software.

A new undetectable malware strain is targeting Linux servers to establish lasting SSH access.
Cybersecurity

A new undetectable malware strain is targeting Linux servers to establish lasting SSH access.

A new backdoor called ‘Plague’ has emerged that compromises critical Linux systems, allowing for covert theft of credentials.
Cybersecurity

A new backdoor called ‘Plague’ has emerged that compromises critical Linux systems, allowing for covert theft of credentials.

© 2025 InfosecToday.com - WordPress Theme by Kadence WP

  • Cybersecurity Glossary
Search