China-Linked Actors Abuse DNS in Advanced Espionage Malware
A China-linked cyber espionage malware campaign demonstrates how attackers abuse DNS traffic to maintain stealthy, long-term command-and-control access.
A China-linked cyber espionage malware campaign demonstrates how attackers abuse DNS traffic to maintain stealthy, long-term command-and-control access.
Recent cyber threats highlight a sharp rise in stealth malware loaders and AI-assisted attack techniques, signaling a shift toward quieter, more adaptive initial access strategies that challenge traditional detection models.
A phishing vulnerability in vLex’s Vincent.ai exposed lawyers and law firms to AI-driven cyberattacks. Attackers manipulated the legal research tool to embed malicious links into AI-generated responses, creating a new avenue for targeted phishing in the legal sector.
A malicious npm package posing as a WhatsApp API library was found harvesting login tokens, messages, and contacts from developers, demonstrating a sophisticated supply chain attack that can persistently link attacker devices to compromised WhatsApp accounts.
A new Android SMS stealer campaign is spreading across Uzbekistan, using deceptive apps to capture messages and authentication codes. The attack highlights fast-evolving mobile threats and the need for stronger device security.
Russia is attempting to weaponize Starlink by acquiring terminals through illicit channels and using them for battlefield communications. This in-depth report examines how Russian units exploit the system, how SpaceX responds, and why satellite networks are becoming critical wartime assets.
A critical zero-day vulnerability in SonicWall SMA1000 appliances is being actively exploited in targeted attacks. This analysis explains the attack flow, affected environments, and the urgent defensive steps organizations must take to secure their networks.
North Korea has transformed cryptocurrency theft into a state-backed, industrial cyber operation. With coordinated threat groups, refined malware pipelines, and aggressive targeting of exchanges and DeFi platforms, DPRK attackers continue scaling their global theft strategy despite expanding sanctions and international pressure.
A breach at 700Credit exposed sensitive personal information of millions of vehicle dealership customers due to an API validation flaw. This analysis examines the incident details, response actions, and key cybersecurity lessons for enterprises.
Cybercriminals are abusing fake OSINT GitHub repos to distribute PyStoreRAT, a JavaScript-based RAT that delivers diverse malware modules through deceptive open-source tools.