Attack

Millions at Risk: Hacked Chrome Extensions Leak Sensitive Data
Data Protection & Privacy Millions at Risk: Hacked Chrome Extensions Leak Sensitive Data

Your web browser is an ecosystem of its own, storing a plethora of sensitive information such as passwords, search history, financial details like credit card numbers, and personal addresses. Similar to how malicious apps can compromise data on your phone or PC, malicious browser extensions can

January 10, 2025
What Are the Top Cybersecurity Threats for Businesses in 2025?
Malware & Threats What Are the Top Cybersecurity Threats for Businesses in 2025?

As cybersecurity threats grow more sophisticated, businesses can expect to face new challenges in 2025. From the proliferation of ransomware to the misuse of AI and insider threats, companies must adapt continuously to stay ahead of potential attacks. The increasingly digital and interconnected

January 3, 2025
Supply Chain Attack Compromises npm Packages, Deploys Monero Miner
Malware & Threats Supply Chain Attack Compromises npm Packages, Deploys Monero Miner

On December 20, 2024, a significant cybersecurity incident unfolded, targeting popular npm packages. Attackers exploited a hijacked npm token to inject malicious code into updates for @rspack/core, @rspack/cli, and the Vant package. The primary goal of this breach was to deploy the XMRig Monero

December 27, 2024
Can UEFI Bootkits Now Threaten Linux Systems With Bootkitty?
Malware & Threats Can UEFI Bootkits Now Threaten Linux Systems With Bootkitty?

The recent identification of Bootkitty, the first UEFI bootkit specifically designed for Linux systems, has taken the cybersecurity industry by storm. For years, UEFI bootkits have primarily targeted Windows environments, but now the threat landscape has expanded to include Linux, thanks to this

December 16, 2024
How Did This Amateur Cybercriminal Get Caught So Easily?
Malware & Threats How Did This Amateur Cybercriminal Get Caught So Easily?

Nicholas Michael Kloster, a 31-year-old man from Kansas City, is facing serious accusations for his involvement in a series of cybercrimes characterized by exceptionally poor operational security. The extensive indictment, which spans just three months in 2024, outlines a string of unlawful

December 16, 2024
Cybercriminals Use Godot Engine to Spread Undetectable Malware Loader
Malware & Threats Cybercriminals Use Godot Engine to Spread Undetectable Malware Loader

Cybercriminals have developed an innovative approach to covertly deliver malware across various operating systems and platforms by creating a malware loader using the Godot Engine, an open-source game development tool. This malware loader, dubbed GodLoader, is distributed via the Stargazers Ghost

December 13, 2024
Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later