Cyber Security News

VoidStealer Seen Bypassing Chrome's App-Bound Encryption
Date

VoidStealer Seen Bypassing Chrome's App-Bound Encryption

The emergence of VoidStealer marks a significant evolution in the infostealer malware landscape. It demonstrates how quickly threat actors adapt to defensive innovations. By using a novel debugger-based technique to bypass Google Chrome's Application-Bound Encryption (ABE), VoidStealer highlights th

New iOS Exploit Kit DarkSword Targets iPhones
Date

New iOS Exploit Kit DarkSword Targets iPhones

A newly uncovered iOS exploitation framework called DarkSword is reshaping the mobile threat landscape. It signals a shift from targeted espionage tools to scalable, multipurpose attack infrastructure. Joint research from Google Threat Intelligence Group (GTIG) and Lookout shows how advanced exploit

SEO Poisoning Attack Driving Credential Theft
Date

SEO Poisoning Attack Driving Credential Theft

A financially motivated threat actor is leveraging deceptive websites and weaponized software installers to steal corporate VPN credentials, underscoring the rising sophistication of social-engineering-based cyber intrusions. Security researchers recently uncovered a campaign in which attackers dis

New BeatBanker Malware Masquerading As Starlink
Date

New BeatBanker Malware Masquerading As Starlink

Cybercriminals continue to refine mobile malware campaigns by blending social engineering, financial fraud, and covert resource exploitation into a single attack chain. A newly identified Android malware strain, BeatBanker, demonstrates this evolution by combining banking Trojan capabilities, crypto

Fake Claude Code Installation Guides Deliver Amatera
Date

Fake Claude Code Installation Guides Deliver Amatera

Cybercriminals are increasingly exploiting the popularity of AI development tools to distribute malware through sophisticated social engineering campaigns. Security researchers recently uncovered a new attack technique, InstallFix, that leverages fake installation guides for popular command-line too

Global Cybercrime Disruptions Target LeakBase And Tycoon2FA
Date

Global Cybercrime Disruptions Target LeakBase And Tycoon2FA

A coordinated international law enforcement effort has delivered a significant blow to the cybercrime ecosystem. Authorities from the United States, Europe, and multiple partner nations recently dismantled the major hacker forum LeakBase. They also disrupted Tycoon2FA, one of the world's largest phi

North Korea's APT37 Seen Breaching Air-Gapped Networks
Date

North Korea's APT37 Seen Breaching Air-Gapped Networks

APT37 is again making headlines, where previously the North Korean-linked state-sponsored group was linked with deploying data wipers; now they're breaching air-gapped networks. Also tracked under aliases such as ScarCruft, Reaper, Red Eyes, and Ricochet Chollima, this actor has long been associated

Fake Next.js Interview Turns Into Machine Compromise
Date

Fake Next.js Interview Turns Into Machine Compromise

In February 2026, researchers revealed a coordinated campaign that targeted software developers through fake job interview projects, demonstrating how threat actors increasingly weaponize trust within development workflows. This is yet another example of threat actors targeting developers specifical

ATM Malware Attacks Result In Loss Of $20 Million In 2025
Date

ATM Malware Attacks Result In Loss Of $20 Million In 2025

In 2025 and early 2026, law enforcement and cybersecurity agencies in the United States have sounded repeated alarms over the rise of sophisticated ATM "jackpotting" attacks, incidents in which threat actors use malware and physical access to force automated teller machines to dispense cash illegall