Cyber Security News

The Weaponization Of Surveillance For Cyber-Kinetic Warfare
Date

The Weaponization Of Surveillance For Cyber-Kinetic Warfare

Cyber and kinetic warfare have merged into a new phase. Internet-connected devices, especially IP cameras, are now both intelligence assets and strategic risks. Recent events in the 2026 Middle East conflict show how compromised surveillance, coordinated cyberattacks, and DDoS campaigns are changing

LiteLLM PyPI Package Backdoored
Date

LiteLLM PyPI Package Backdoored

A supply chain attack campaign attributed to the TeamPCP threat group marks one of the most consequential and fast-moving compromises of modern software development infrastructure. The attackers targeted trusted developer tools and open-source ecosystems. This campaign showed how a single foot

VoidStealer Seen Bypassing Chrome's App-Bound Encryption
Date

VoidStealer Seen Bypassing Chrome's App-Bound Encryption

The emergence of VoidStealer marks a significant evolution in the infostealer malware landscape. It demonstrates how quickly threat actors adapt to defensive innovations. By using a novel debugger-based technique to bypass Google Chrome's Application-Bound Encryption (ABE), VoidStealer highlights th

New iOS Exploit Kit DarkSword Targets iPhones
Date

New iOS Exploit Kit DarkSword Targets iPhones

A newly uncovered iOS exploitation framework called DarkSword is reshaping the mobile threat landscape. It signals a shift from targeted espionage tools to scalable, multipurpose attack infrastructure. Joint research from Google Threat Intelligence Group (GTIG) and Lookout shows how advanced exploit

SEO Poisoning Attack Driving Credential Theft
Date

SEO Poisoning Attack Driving Credential Theft

A financially motivated threat actor is leveraging deceptive websites and weaponized software installers to steal corporate VPN credentials, underscoring the rising sophistication of social-engineering-based cyber intrusions. Security researchers recently uncovered a campaign in which attackers dis

New BeatBanker Malware Masquerading As Starlink
Date

New BeatBanker Malware Masquerading As Starlink

Cybercriminals continue to refine mobile malware campaigns by blending social engineering, financial fraud, and covert resource exploitation into a single attack chain. A newly identified Android malware strain, BeatBanker, demonstrates this evolution by combining banking Trojan capabilities, crypto

Fake Claude Code Installation Guides Deliver Amatera
Date

Fake Claude Code Installation Guides Deliver Amatera

Cybercriminals are increasingly exploiting the popularity of AI development tools to distribute malware through sophisticated social engineering campaigns. Security researchers recently uncovered a new attack technique, InstallFix, that leverages fake installation guides for popular command-line too

Global Cybercrime Disruptions Target LeakBase And Tycoon2FA
Date

Global Cybercrime Disruptions Target LeakBase And Tycoon2FA

A coordinated international law enforcement effort has delivered a significant blow to the cybercrime ecosystem. Authorities from the United States, Europe, and multiple partner nations recently dismantled the major hacker forum LeakBase. They also disrupted Tycoon2FA, one of the world's largest phi

North Korea's APT37 Seen Breaching Air-Gapped Networks
Date

North Korea's APT37 Seen Breaching Air-Gapped Networks

APT37 is again making headlines, where previously the North Korean-linked state-sponsored group was linked with deploying data wipers; now they're breaching air-gapped networks. Also tracked under aliases such as ScarCruft, Reaper, Red Eyes, and Ricochet Chollima, this actor has long been associated

Fake Next.js Interview Turns Into Machine Compromise
Date

Fake Next.js Interview Turns Into Machine Compromise

In February 2026, researchers revealed a coordinated campaign that targeted software developers through fake job interview projects, demonstrating how threat actors increasingly weaponize trust within development workflows. This is yet another example of threat actors targeting developers specifical