Wednesday, October 29, 2025
Follow on LinkedIn
LLM-enabled MalTerminal Malware GPT-4

LLM-enabled MalTerminal Malware Leverages GPT-4 to Generate Ransomware Code

Cybersecurity researchers have identified what is believed to be the earliest known instance of malware that leverages a Large Language Model (LLM) to generate...
Fileless vs Traditional Malware

How Fileless Malware Differs From Traditional Malware Attacks

The cybersecurity landscape has witnessed a dramatic evolution in attack methodologies, with fileless malware emerging as one of the most sophisticated and dangerous threats...
First-Ever Malicious MCP Server

First-Ever Malicious MCP Server Found in the Wild Steals Emails via AI Agents

The first-ever malicious Model-Context-Prompt (MCP) server discovered in the wild, a trojanized npm package named postmark-mcp that has been secretly exfiltrating sensitive data from...
Windows Mark of the Web Files Using LNK Stomping Attack

Hackers Bypassing Windows Mark of the Web Files Using LNK Stomping Attack

A sophisticated attack technique called LNK Stomping has emerged as a critical threat to Windows security, exploiting a fundamental flaw in how the operating...
Clickfix Attack Free WiFi

New Clickfix Attack Promises “Free WiFi” But Delivers Powershell-Based Malware

The Cybersecuritynews researcher team uncovered a sophisticated social engineering campaign that is exploiting the public's need for free internet access, using deceptive Wi-Fi portals...
New Malware Using Azure Functions

New Malware Using Azure Functions For Hosting Command And Control Infrastructure

A new, sophisticated malware campaign has been uncovered that leverages Microsoft's Azure Functions for its command-and-control (C2) infrastructure, a novel technique that complicates detection...

How SOCs Triage Incidents in Seconds with Threat Intelligence

When every minute counts, it’s important to have access to fresh threat intelligence at the tip of your finger. That’s what all high-performing SOC...
ERMAC v3.0 Banking Malware Source Code Exposed

ERMAC v3.0 Banking Malware Source Code Exposed via Weak Password ‘changemeplease’

Researchers at Hunt.io have made a significant discovery in the cybersecurity field by obtaining and analyzing the complete source code of ERMAC V3.0. This...
Plague Malware Attacking Linux Servers

New Undectable Plague Malware Attacking Linux Servers to Gain Persistent SSH Access

A sophisticated Linux backdoor dubbed Plague has emerged as an unprecedented threat to enterprise security, evading detection across all major antivirus engines while establishing...
DCHSpy Android Malware

New DCHSpy Android Malware Steals WhatsApp Data, Call Logs, Record Audio and Take Photos

A sophisticated new variant of DCHSpy Android surveillanceware, deployed by the Iranian cyber espionage group MuddyWater just one week after escalating tensions in the...
CSN

Top 10