cyber security

SharkStealer Using EtherHiding Pattern to Resolves Communications With C2 Channels

A sophisticated information-stealing malware written in Golang has emerged, leveraging blockchain technology to establish covert command-and-control channels. SharkStealer represents a…

17 hours ago

Hackers Abuse Microsoft 365 Exchange Direct Send to Bypass Content Filters and Harvest Sensitive Data

Microsoft 365 Exchange Online's Direct Send feature, originally designed to enable legacy devices and applications to send emails without authentication,…

18 hours ago

Bitter APT Hackers Exploit WinRAR Zero-Day Via Weaponized Word Documents to Steal Sensitive Data

The Bitter APT group, also tracked as APT-Q-37 and known in China as 蔓灵花, has launched a sophisticated cyberespionage campaign…

19 hours ago

Hackers Can Access Microsoft Teams Chat and Emails by Retrieving Access Tokens

A new technique allows hackers to extract encrypted authentication tokens from Microsoft Teams on Windows, enabling unauthorized access to chats,…

21 hours ago

Vidar Stealer Bypassing Browser Security Via Direct Memory Injection to Steal Login Credentials

A sophisticated information-stealing malware known as Vidar Stealer has undergone a complete architectural transformation with the release of version 2.0,…

1 day ago

Threat Actors With Stealer Malwares Processing Millions of Credentials a Day

The stealer malware ecosystem has evolved into a sophisticated criminal enterprise capable of processing hundreds of millions of credentials daily.…

1 day ago

New Rust-Based ChaosBot Malware Leverages Discord for Stealthy Command and Control

A sophisticated new threat has emerged in the cybersecurity landscape, leveraging the popular communication platform Discord to conduct covert operations.…

1 day ago

Salt Typhoon Using Zero-Day Exploits and DLL Sideloading Techniques to Attack Organizations

Salt Typhoon, a China-linked advanced persistent threat (APT) group active since 2019, has emerged as one of the most sophisticated…

1 day ago

Hackers Exploited Samsung Galaxy S25 0-Day Vulnerability to Enable Camera and Track Location

At Pwn2Own Ireland 2025, cybersecurity researchers Ben R. and Georgi G. from Interrupt Labs showcased an impressive achievement by successfully…

1 day ago

SpaceX Disabled 2,500+ Starlink Terminals Tied to Scam Centers in Myanmar

SpaceX has disabled over 2,500 Starlink satellite internet terminals linked to notorious scam centers in Myanmar. The action underscores the…

1 day ago