Cyber Espionage | Malware Techniques | Social Engineering Kimsuky APT hackers are utilizing LNK files as a means to deploy reflective malware, successfully evading detection by Windows Defender.
Cybersecurity Threats | E-commerce Fraud | Phishing and Malware Campaigns A campaign utilizing artificial intelligence has created 15,000 counterfeit TikTok Shop websites that distribute malware and steal cryptocurrency.
Financial Fraud | Malware Campaign | Phishing Techniques A new Android malware is disguising itself as SBI Card and Axis Bank applications to extract users’ financial information.
Cybercrime | Data Theft | Malware Techniques A novel Python-based PXA stealer distributed through Telegram has reportedly compromised 200,000 unique passwords alongside numerous credit card details.
Cybersecurity Awareness | Developer Security Practices | Phishing Campaigns Mozilla has issued a warning regarding phishing attacks aimed at the accounts of add-on developers.
Cybersecurity The PlayPraetor Android Trojan has infected over 11,000 devices by using counterfeit Google Play pages and advertisements on Meta.
Cybersecurity Interlock Ransomware Utilizes ClickFix Method to Execute Harmful Commands on Windows Systems
Cybersecurity Summary of Cybersecurity Updates – Vulnerabilities in Chrome and Gemini, malware targeting Linux, and a new Man-in-the-Prompt attack.