Tag: malware
-
Süßes oder Scam Halloween ist eine Zeit für saisonalen Internetbetrug
Deutschland auf Rang Zwei als Zielland für Spambetrug. Fünf Prozent des Spams stammen aus Deutschland. 63 Prozent des Spams mit Halloween-Bezug sind bösartig und beabsichtigen, Malware zu implementieren oder Zugangsdaten oder Geld zu stehlen. Die Bitdefender Labs haben anhand ihrer Telemetrie in der Zeit vom 15. September bis zum 15. Oktober einen globalen Anstieg von… First…
-
Hacking Team successor linked to malware campaign, new ‘Dante’ commercial spyware
Kaspersky researchers said Memento Labs appears to be behind both the Operation ForumTroll malware and spyware, known as Dante. First seen on cyberscoop.com Jump to article: cyberscoop.com/hacking-team-dante-spyware-kaspersky/
-
New ChatGPT Atlas Browser Exploit Lets Attackers Plant Persistent Hidden Commands
Tags: access, ai, chatgpt, cybersecurity, exploit, intelligence, malicious, malware, openai, vulnerabilityCybersecurity researchers have discovered a new vulnerability in OpenAI’s ChatGPT Atlas web browser that could allow malicious actors to inject nefarious instructions into the artificial intelligence (AI)-powered assistant’s memory and run arbitrary code.”This exploit can allow attackers to infect systems with malicious code, grant themselves access privileges, or deploy malware,” LayerX First seen on thehackernews.com…
-
New HyperRat Android Malware Sold as Ready-Made Spy Tool
Researchers have uncovered HyperRat, a new Android malware sold as a service, giving attackers remote control, data theft tools, and mass phishing features. First seen on hackread.com Jump to article: hackread.com/hyperrat-android-malware-sold-spy-tool/
-
DDoS, data theft, and malware are storming the gaming industry
When the pandemic kept people at home in 2020, millions turned to games for an escape. The surge turned every console, PC, and phone into part of a vast online network. More … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/10/27/gaming-industry-cyber-threats-risks/
-
DDoS, data theft, and malware are storming the gaming industry
When the pandemic kept people at home in 2020, millions turned to games for an escape. The surge turned every console, PC, and phone into part of a vast online network. More … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/10/27/gaming-industry-cyber-threats-risks/
-
SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 68
Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape Malware Newsletter TikTok videos continue to push infostealers in ClickFix attacks 131 Spamware Extensions Targeting WhatsApp Flood Chrome Web Store Salty Much: Darktrace’s view on a recent Salt Typhoon intrusion Shifts in the Underground: The Impact…
-
Check Point Research deckt YouTube Ghost Malware-Netzwerk auf
Tags: malwareÜber ein Jahr lang haben die Sicherheitsforscher von Check Point dabei geholfen, das GhostNetwork lahmzulegen, welches mittels Youtube-Videos Malware verbreitet hat. Mehr als 3000 Videos konnten abgeschaltet werden. Hochgeladen wurden sie aus vielen Ländern, auch aus Deutschland. Das Thema ist … First seen on borncity.com Jump to article: www.borncity.com/blog/2025/10/26/check-point-research-deckt-youtube-ghost-malware-netzwerk-auf/
-
Insider Threat Prevention
Introduction: The Hidden Risk Inside Every Organization Cybersecurity often focuses on external threats”, hackers, malware, phishing, and ransomware. But one of the most dangerous and underestimated risks often lies within the organization: the insider threat. Whether it’s a disgruntled employee, an unaware user, or a compromised contractor, insider threats have the potential to bypass even…
-
Infostealers Run Wild
Malware Captures Billions of Credentials. The threat posed by information-stealing malware continues to rise, as it mass harvests ever-greater quantities of user credentials and offers them for sale across the cybercrime underground. Researchers have recently tracked 1.8 billion stolen credentials being sold across illicit marketplaces. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/infostealers-run-wild-a-29823
-
Cybersecurity Snapshot: Top Advice for Detecting and Preventing AI Attacks, and for Securing AI Systems
Tags: access, ai, attack, authentication, awareness, best-practice, breach, business, chatgpt, china, ciso, cloud, computing, container, control, credentials, crime, cve, cyber, cyberattack, cybersecurity, data, defense, detection, email, exploit, extortion, finance, flaw, framework, fraud, google, governance, government, group, guide, hacker, hacking, healthcare, iam, identity, incident response, intelligence, LLM, malicious, malware, mitigation, monitoring, network, open-source, openai, organized, phishing, ransom, risk, risk-management, russia, sans, scam, service, skills, soc, strategy, supply-chain, technology, theft, threat, tool, training, vulnerability, zero-trustAs organizations eagerly adopt AI, cybersecurity teams are racing to protect these new systems. In this special edition of the Cybersecurity Snapshot, we round up some of the best recent guidance on how to fend off AI attacks, and on how to safeguard your AI systems. Key takeaways Developers are getting new playbooks from groups…
-
Youtube-Geisternetzwerk Wie Check Point Research dazu beitrug, 3000 bösartige Videos zu entfernen, die Malware verbreiteten
Check Point Software Technologies hat ein groß angelegtes Cyber-Netzwerk aufgedeckt, das sich in einem der vertrauenswürdigsten Bereiche des Internets versteckte: Youtube. Was wie harmlose Tutorials und Software-Demos aussah, entpuppte sich als ausgeklügeltes Netzwerk zur Verbreitung von Malware, bekannt als das . Zusammengefasst: Check Point Research deckte das Youtube-Ghost-Network auf, eine groß angelegte Malware-Verbreitungsaktion, […] First…
-
This browser claims “perfect privacies protection,” but it acts like malware
Researchers note links to Asia’s booming cybercrime and illegal gambling networks. First seen on arstechnica.com Jump to article: arstechnica.com/security/2025/10/this-browser-claims-perfect-privacies-protection-but-it-acts-like-malware/
-
APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign
A Pakistan-nexus threat actor has been observed targeting Indian government entities as part of spear-phishing attacks designed to deliver a Golang-based malware known as DeskRAT.The activity, observed in August and September 2025 by Sekoia, has been attributed to Transparent Tribe (aka APT36), a state-sponsored hacking group known to be active since at least 2013. It…
-
Windows-Malware: Angriff auf Xubuntu-Webseite
Unbekannte haben die Downloadseite von Xubuntu kurzzeitig kompromittiert und Windows-Malware verteilt. Das Problem ist inzwischen behoben. First seen on golem.de Jump to article: www.golem.de/news/windows-malware-angriff-auf-xubuntu-webseite-2510-201520.html
-
Telegram Messenger Abused by Android Malware to Seize Full Device Control
Security researchers at Doctor Web have uncovered a sophisticated Android backdoor disguised as Telegram X that grants cybercriminals complete control over victims’ accounts and devices. The malware, identified as Android.Backdoor.Baohuo.1.origin, has already infected more than 58,000 devices worldwide, with approximately 20,000 active infections currently being monitored. This threat represents a significant escalation in mobile malware…
-
Telegram Messenger Abused by Android Malware to Seize Full Device Control
Security researchers at Doctor Web have uncovered a sophisticated Android backdoor disguised as Telegram X that grants cybercriminals complete control over victims’ accounts and devices. The malware, identified as Android.Backdoor.Baohuo.1.origin, has already infected more than 58,000 devices worldwide, with approximately 20,000 active infections currently being monitored. This threat represents a significant escalation in mobile malware…
-
New PDF Tool Detects Malicious Files Using PDF Object Hashing
Proofpoint has released a new open-source tool called PDF Object Hashing that helps security teams detect and track malicious files distributed as PDFs. The tool is now available on GitHub and represents a significant advancement in identifying suspicious documents used by threat actors in phishing campaigns, malware distribution, and business email compromise attacks. PDFs have…
-
New RedTiger Tool Targets Gamers and Discord Accounts in the Wild
Gamers face a growing threat from cybercriminals exploiting popular gaming and communication platforms. A dangerous infostealer called RedTiger is now actively circulating in the wild, specifically designed to steal Discord credentials, gaming accounts, and sensitive financial information from unsuspecting players worldwide. Security researchers have identified multiple variants of the malware already targeting victims, with evidence…
-
Baohuo Android Malware Hijacks Telegram Accounts via Fake Telegram X
New Android malware Baohuo hijacks Telegram X accounts, stealing data and controlling chats. Over 58,000 devices infected, mainly in India and Brazil. First seen on hackread.com Jump to article: hackread.com/baohuo-android-malware-telegram-x-hijacks-accounts/
-
Baohuo Android Malware Hijacks Telegram Accounts via Fake Telegram X
New Android malware Baohuo hijacks Telegram X accounts, stealing data and controlling chats. Over 58,000 devices infected, mainly in India and Brazil. First seen on hackread.com Jump to article: hackread.com/baohuo-android-malware-telegram-x-hijacks-accounts/
-
Baohuo Android Malware Hijacks Telegram Accounts via Fake Telegram X
New Android malware Baohuo hijacks Telegram X accounts, stealing data and controlling chats. Over 58,000 devices infected, mainly in India and Brazil. First seen on hackread.com Jump to article: hackread.com/baohuo-android-malware-telegram-x-hijacks-accounts/
-
3,000 YouTube Videos Exposed as Malware Traps in Massive Ghost Network Operation
A malicious network of YouTube accounts has been observed publishing and promoting videos that lead to malware downloads, essentially abusing the popularity and trust associated with the video hosting platform for propagating malicious payloads.Active since 2021, the network has published more than 3,000 malicious videos to date, with the volume of such videos tripling since…
-
YouTube Ghost Malware Campaign: Over 3,000 Infected Videos Target Users
Check Point Research has uncovered a massive malware distribution operation called the YouTube Ghost Network, featuring over 3,000 malicious videos designed to infect unsuspecting users with dangerous information-stealing malware. This sophisticated cybercriminal network has been operating since at least 2021, with activity tripling in 2025 as threat actors increasingly exploit YouTube’s trusted platform to bypass…
-
Souverän in der Cloud: Adfinis und enclaive sichern die Software Supply Chain
Adfinis, ein international agierender IT-Dienstleister für Open-Source-Lösungen, und das deutsche Confidential-Computing-Unternehmen enclaive geben ihre neue Partnerschaft bekannt. Die Kooperation kombiniert moderne Verschlüsselungstechnologien mit einem durchgängigen IT-Lifecycle-Ansatz und stärkt die Sicherheit und Souveränität in Cloud-Umgebungen. Cyberattacken zielen immer häufiger auf die Software-Lieferkette: Angreifer schleusen Backdoors, Malware oder Schwachstellen in Open-Source-Komponenten ein, um sich später Zugang… First…
-
Souverän in der Cloud: Adfinis und enclaive sichern die Software Supply Chain
Adfinis, ein international agierender IT-Dienstleister für Open-Source-Lösungen, und das deutsche Confidential-Computing-Unternehmen enclaive geben ihre neue Partnerschaft bekannt. Die Kooperation kombiniert moderne Verschlüsselungstechnologien mit einem durchgängigen IT-Lifecycle-Ansatz und stärkt die Sicherheit und Souveränität in Cloud-Umgebungen. Cyberattacken zielen immer häufiger auf die Software-Lieferkette: Angreifer schleusen Backdoors, Malware oder Schwachstellen in Open-Source-Komponenten ein, um sich später Zugang… First…
-
AI browsers can be abused by malicious AI sidebar extensions: Report
‘Dumpster fires’: David Shipley, head of Canadian employee security awareness training firm Beauceron Security, agrees.”I think if CISOs are bored and want to spice up their lives with an incident, they should roll out these AI-powered hot messes to their users,” he said .”But, if they’re like most CISOs and they have lots of problems,…
-
Pakistan-Linked TransparentTribe APT Deploys AI-Assisted DeskRAT Malware Against India’s BOSS Linux Systems
The post Pakistan-Linked TransparentTribe APT Deploys AI-Assisted DeskRAT Malware Against India’s BOSS Linux Systems appeared first on Daily CyberSecurity. First seen on securityonline.info Jump to article: securityonline.info/pakistan-linked-transparenttribe-apt-deploys-ai-assisted-deskrat-malware-against-indias-boss-linux-systems/
-
North Korean hacking group targeting European drone maker with ScoringMathTea malware
Researchers at ESET said they found evidence of a new tentacle of the long-running Operation DreamJob campaign, where North Korea’s Lazarus group sends malware-laden emails purporting to be from recruiters at top companies. First seen on therecord.media Jump to article: therecord.media/north-korea-hackers-target-europe-drone-makers

