Beware of Clickfix Lures ‘Fix Now’ & ‘Bot Verification’ That Downloads & Executes Malware
A sophisticated malware campaign dubbed "Clickfix" has emerged, targeting users through deceptive browser notifications and pop-ups that prompt immediate action through "Fix Now" and "Bot Verification" buttons.
When triggered, these seemingly harmless prompts initiate a...
VanHelsing Ransomware Attacking Windows Systems With New Evasion Technique & File Extension
A new ransomware strain named VanHelsing has emerged, targeting Windows systems with sophisticated encryption techniques and advanced evasion tactics.
The malware, first observed on March 16, 2025, primarily focuses on government, manufacturing, and pharmaceutical sectors...
Hackers Abuse Cloudflare Services for Sophisticated Phishing Attacks
Cybersecurity experts have identified a troubling new trend where threat actors are exploiting legitimate Cloudflare services to orchestrate highly convincing phishing campaigns.
The attacks, which began emerging in early 2025, leverage Cloudflare Workers and Pages...
Chinese eCrime Hacker Group Attacking Users in 120+ Coutries to Steal Banking Credentials
A sophisticated Chinese eCrime group known as "Smishing Triad" has expanded its operations to target organizations and individuals across at least 121 countries worldwide.
The group, active since 2023, has systematically targeted multiple industries including...
Malware Operation ‘DollyWay’ Hacked 20,000+ WordPress Sites Globally
In recent years, the cybersecurity landscape has witnessed a significant rise in sophisticated malware operations. One such operation is "DollyWay," a long-running campaign that has compromised over 20,000 WordPress sites globally.
This operation is notable...
OpenCTI With ANY.RUN: OSINT Platform to SOC & MDR Teams for Malware Analysis
ANY.RUN integrates with OpenCTI to streamline threat analysis, which allows enriching OpenCTI observations with data directly from ANY.RUN analysis.
OpenCTI is a central hub that collects threat data from various sources, like ANY.RUN, through connectors,...
Hackers Weaponizing Typosquatted Libraries To Inject SSH Backdoors
A sophisticated attack targeting npm users has been recently uncovered by the Socket's threat research team in a concerning development for the open-source community.
The threat actor, identified as "sanchezjosephine180," has published six malicious npm...
Threat Actors Leveraging Free Email Services To Attack Govt & Education Entities
In recent years, threat actors have increasingly targeted free email services to compromise government and educational entities.
One such group, known as GreenSpot, has been particularly active in this domain. GreenSpot, believed to operate from...
Babuk Ransomware Group Claims Attack on Telecommunication Firm Orange
Babuk, a notorious ransomware group, has claimed responsibility for a significant cyberattack on Orange, one of the world's leading telecommunications companies.
This attack, which was meticulously planned over a long period, resulted in the exfiltration...
Clio – Real-Time Logging Tool With Locking, User Authentication, and Audit Trails
Clio has emerged as a revolutionary real-time logging solution developed by cybersecurity engineers at CyberLock Technologies in the evolving landscape of cybersecurity tools.
Launched in January 2025, this sophisticated tool addresses critical gaps in traditional...