Cyber Security News

SEO Poisoning Attack Driving Credential Theft
Date

SEO Poisoning Attack Driving Credential Theft

A financially motivated threat actor is leveraging deceptive websites and weaponized software installers to steal corporate VPN credentials, underscoring the rising sophistication of social-engineering-based cyber intrusions. Security researchers recently uncovered a campaign in which attackers dis

New BeatBanker Malware Masquerading As Starlink
Date

New BeatBanker Malware Masquerading As Starlink

Cybercriminals continue to refine mobile malware campaigns by blending social engineering, financial fraud, and covert resource exploitation into a single attack chain. A newly identified Android malware strain, BeatBanker, demonstrates this evolution by combining banking Trojan capabilities, crypto

Fake Claude Code Installation Guides Deliver Amatera
Date

Fake Claude Code Installation Guides Deliver Amatera

Cybercriminals are increasingly exploiting the popularity of AI development tools to distribute malware through sophisticated social engineering campaigns. Security researchers recently uncovered a new attack technique, InstallFix, that leverages fake installation guides for popular command-line too

Global Cybercrime Disruptions Target LeakBase And Tycoon2FA
Date

Global Cybercrime Disruptions Target LeakBase And Tycoon2FA

A coordinated international law enforcement effort has delivered a significant blow to the cybercrime ecosystem. Authorities from the United States, Europe, and multiple partner nations recently dismantled the major hacker forum LeakBase. They also disrupted Tycoon2FA, one of the world's largest phi

North Korea's APT37 Seen Breaching Air-Gapped Networks
Date

North Korea's APT37 Seen Breaching Air-Gapped Networks

APT37 is again making headlines, where previously the North Korean-linked state-sponsored group was linked with deploying data wipers; now they're breaching air-gapped networks. Also tracked under aliases such as ScarCruft, Reaper, Red Eyes, and Ricochet Chollima, this actor has long been associated

Fake Next.js Interview Turns Into Machine Compromise
Date

Fake Next.js Interview Turns Into Machine Compromise

In February 2026, researchers revealed a coordinated campaign that targeted software developers through fake job interview projects, demonstrating how threat actors increasingly weaponize trust within development workflows. This is yet another example of threat actors targeting developers specifical

ATM Malware Attacks Result In Loss Of $20 Million In 2025
Date

ATM Malware Attacks Result In Loss Of $20 Million In 2025

In 2025 and early 2026, law enforcement and cybersecurity agencies in the United States have sounded repeated alarms over the rise of sophisticated ATM "jackpotting" attacks, incidents in which threat actors use malware and physical access to force automated teller machines to dispense cash illegall

Defense Industrial Base Under Siege
Date

Defense Industrial Base Under Siege

Over the past decade, the traditional understanding of military conflict has shifted. No longer confined to kinetic confrontations and physical engagements, modern strategic competition extends deeply into cyberspace. In an era where digital infrastructure underpins critical military capabilities, t

Crazy Ransomware Using Legitimate Monitoring Tools
Date

Crazy Ransomware Using Legitimate Monitoring Tools

In recent months, cybersecurity researchers have discovered that advanced ransomware operators are abusing legitimate employee-monitoring and remote-support software as covert access channels into corporate networks. This shift represents a tactical evolution in ransomware tradecraft, where adversar