Cyber Security News

New Atroposia Malware - A Sign Of The AI Times
Date

New Atroposia Malware - A Sign Of The AI Times

The emergence of the Atroposia malware marks another significant step forward in the evolution of cyber threats. Where earlier remote-access trojans (RATs) focused on giving attackers control over compromised computers, Atroposia takes it a step further by combining that control with active intellig

ColdRiver's "I Am Not a Robot" ClickFix Attack Campaign
Date

ColdRiver's "I Am Not a Robot" ClickFix Attack Campaign

In 2025, cybersecurity researchers uncovered a new and unusual scam from a Russian hacking group known as ColdRiver. The group, also known as Star Blizzard or the Callisto Group, had discovered a way to exploit one of the Internet's most familiar security tools, the "I am not a robot" CAPTCHA, and t

Threat Actors Abusing Google Ads To Deploy Odyssey And AMOS
Date

Threat Actors Abusing Google Ads To Deploy Odyssey And AMOS

A recent campaign demonstrates how modern malvertising, ads pointing to malicious websites, can use legitimate search channels to trick technically sophisticated users into installing powerful macOS information-stealing malware. Operators bought Google Ads that pointed to convincing fake download p

New Android Spyware ClayRat Targets Russian Speakers
Date

New Android Spyware ClayRat Targets Russian Speakers

ClayRat, a newly discovered Android spyware family, has emerged as a sophisticated and rapidly proliferating threat that researchers say primarily targets Russian-speaking users. Security analysts at Zimperium first cataloged the campaign and published detailed technical notes and indicators of comp

Medusa Ransomware's Actively Exploiting CVE-2025-10035
Date

Medusa Ransomware's Actively Exploiting CVE-2025-10035

In September 2025, security researchers disclosed a critical vulnerability in Fortra's GoAnywhere Managed File Transfer (MFT) platform. Tracked as CVE-2025-10035, the flaw has rapidly become a favored target for ransomware actors, particularly those deploying Medusa ransomware. The vulnerability an

Clop Ransomware Sends Extortion Emails To Oracle Clients
Date

Clop Ransomware Sends Extortion Emails To Oracle Clients

In late September 2025, a wave of extortion emails began arriving at executives and IT leaders of organizations running Oracle's E-Business Suite (EBS). The messages claimed that attackers had stolen sensitive enterprise data and demanded payment to prevent public disclosure. The emails surfaced on

Akira's MFA Bypass Trick Used On SonicWall VPNs
Date

Akira's MFA Bypass Trick Used On SonicWall VPNs

In recent months, cybersecurity researchers have raised concerns about a sophisticated and rapidly evolving Akira ransomware campaign targeting SonicWall SSL VPN appliances. The attackers have demonstrated an unsettling ability to bypass one-time password multifactor authentication (MFA), move later

Fake GitHub Installers Used To Spread AMOS To macOS Users
Date

Fake GitHub Installers Used To Spread AMOS To macOS Users

Cybercriminals have increasingly weaponized trust: instead of exploiting zero-day flaws, they trick users into installing malicious software that impersonates legitimate apps. In a large-scale campaign observed by Malwarebytes in 2025, threat actors published convincing GitHub pages that posed as do