Advertisement · 728 × 90
#
Hashtag
#MALWARE
Advertisement · 728 × 90
Post image

Watch out as new macOS Malware #notnullOSX targets crypto wallets over $10K, using fake apps, Terminal tricks, and backdoors to steal funds and sensitive data.

Read: hackread.com/macos-malwar...

#CyberSecurity #macOS #Malware #Crypto

1 0 0 0

New Chaos malware variant exploits misconfigured cloud deployments and adds SOCKS proxy capabilities ☁️ Researchers warn of expanded targeting scope.

#cybersecurity #infosec #malware #cloud #databreach

Read more -> cyberthreats247.com

0 0 0 0
Modern Problems Require Modern Solutions

Modern Problems Require Modern Solutions

Modern Problems Require Modern Solutions

#security #antivirus #Malware #Businesslogic #Unethical

programmerhumor.io/security-memes/modern-pr...

0 0 1 0
【重要】SNSのなりますましアカウントに関する注意喚起 平素より弊社かまわぬをご愛顧いただき、誠にありがとうございます。 現在、TikTok上において、弊社になりすましたアカウントの存在が複数確認されております。弊社ではTikTokのアカウントを開設しておりません。 当該アカウントは、弊社の社名やロゴ画像を使用し、公式アカウントであるかのように装っておりますが、弊社とは一切関係ございません。また、商品PR依頼等を装い、個人情報の入力を促すダイレクトメッセージが送信される事例も報告されております。 お客様におかれましては、以下の点に十分ご注意ください。 不審なダイレクトメッセージには返信しない 記載されたURLにはアクセスしない 個人情報の入力を行わない 万が一メッセージを受信された場合は

【重要】SNSのなりますましアカウントに関する注意喚起
かまわぬ
kamawanu-store.jp/blogs/news/n...

#TikTok #かまわぬ #kamawanu #スパム #spam #なりすまし #マルウェア #malware

0 0 0 0
Preview
Film 2387 - Mission: Impossible - The Final Reckoning Intro : I really wanted to see at the movies, but I almost missed it. Film 2387 : "Mission: Impossible - The Final Reckoning" (2025)...

#ActorAwards 2026:
• Stunt Ensemble in a Motion Picture

#MissionImpossible #TheFinalReckoning #ChristopherMcQuarrie #TomCruise #HayleyAtwell #VingRhames #SimonPegg #HenryCzerny #JanetMcTeer #NickOfferman #AngelaBassett #IMF #EthanHunt #MI #malware #AI
hollywoodciak.blogspot.com/2025/09/film...

0 0 0 0
Preview
The long road to your crypto: ClipBanker and its marathon infection chain At the start of the year, a certain Trojan caught our eye due to its incredibly long infection chain. In most cases, it kicks off with a web search for “Proxifier”. Proxifiers are speciaized software designed to tunnel traffic for programs that do not natively support proxy servers. They are a go-to for making sure these apps are functional within secured development environments. Introduction to Malware Binary Triage (IMBT) Course Looking to level up your skills? Get 10% off using coupon cod...

The long road to your crypto: ClipBanker and its marathon infection chain At the start of the year, a certain Trojan caught our eye due to its incredibly long infection chain. In most cases, it kic...

#Malware #News

Origin | Interest | Match

0 0 0 0
Post image

Venezia sotto tiro: 600$ per l’accesso al sistema anti allagamento della Basilica di San Marco

📌 Link all'articolo : www.redhotcyber.com/post/venezia...

A cura di Luca Stivali del gruppo DarkLab

#redhotcyber #news #cybersecurity #hacking #malware #ransomware #infrastrutturacritica

0 0 0 0

APT28 Deploys PRISMEX Malware in Campaign Targeting Ukraine and NATO Allies reconbee.com/apt28-deploy...

#APT28 #PRISMEXmalware #malware #campaign #ukraine #NATO #cyberattack

0 0 0 0
North Korea’s Contagious Interview Campaign Spreads Across 5 Ecosystems, Delivering Staged RAT Payloads Groups Conversations All groups and messages Sign in     North Korea’s Contagious Interview Campaign Spreads Across 5 Ecosystems, Delivering Staged RAT Payloads 0 views Eyal Estrin unread, 3:24 AM (9 minutes ago)    to https://socket.dev/blog/contagious-interview-campaign-spreads-across-5-ecosystems Eyal Estrin Author | Cloud Architect | AWS • Azure • GCP Insights Social: @eyalestrin Connect: https://linktr.ee/eyalestrin Blog: https://security-24-7.com Reply all Reply to author Forward

North Korea’s Contagious Interview Campaign Spreads Across 5 Ecosystems, Delivering Staged RAT Payloads #malware

0 0 0 0
Storm-1175 focuses gaze on vulnerable web-facing assets in high-tempo Medusa ransomware operations     Storm-1175 focuses gaze on vulnerable web-facing assets in high-tempo Medusa ransomware operations 0 views Eyal Estrin unread, 12:24 AM (9 minutes ago)    to https://www.microsoft.com/en-us/security/blog/2026/04/06/storm-1175-focuses-gaze-on-vulnerable-web-facing-assets-in-high-tempo-medusa-ransomware-operations/ Eyal Estrin Author | Cloud Architect | AWS • Azure • GCP Insights Social: @eyalestrin Connect: https://linktr.ee/eyalestrin Blog: https://security-24-7.com Reply all Reply to author Forward

Storm-1175 focuses gaze on vulnerable web-facing assets in high-tempo Medusa ransomware operations #malware

0 0 0 0
Post image

Windows sotto attacco: l’exploit zero-day “BlueHammer” è su GitHub

📌 Link all'articolo : www.redhotcyber.com/post/windows...

A cura di Bajram Zeqiri

#redhotcyber #news #cybersecurity #hacking #malware #windows #exploit #zeroday #vulnerabilita #TOCTOU #SAM

0 0 0 0
Preview
[April-8-2026] Daily Cybersecurity Threat Report [April-8-2026] Daily Cybersecurity Threat Report The Daily Tech Feed - Cybersecurity Daily Report

[April-8-2026] Daily Cybersecurity Threat Report
thedailytechfeed.com/april-8-2026...
#Ransomware #DataBreach #InfoSec #DarkWeb #IncidentResponse #CyberReport #APT #Malware #Phishing #CyberDefense #Hacktivist #Cybercriminal #Vulnerabilities #Darkweb #AI #Fraud #Privacy #Exploits #Digital #Theft

0 0 0 0
NK Contagious Interview Supply Chain Attack

~Socket~
North Korean actors are deploying RATs via malicious packages across npm, PyPI, Go, Rust, and Packagist.
-
IOCs: 66. 45. 225. 94, apachelicense. vercel. app, logkit-tau. vercel. app
-
#DPRK #Malware #ThreatIntel

2 1 0 0
Preview
Sophos Sophos unites unmatched threat intelligence, adaptive AI, and human expertise in an open platform to stop attacks before they strike — giving you the clarity and confidence to stay ahead of every threat.

The latest update for #Sophos includes "Is #compliance complexity outpacing IT capacity?" and "Sophos named a 2026 #Gartner Peer Insights Customers' Choice for Managed Detection and Response".

#cybersecurity #antivirus #malware https://opsmtrs.com/487u2e2

0 0 0 0
Preview
OCR Releases Risk Management Video From HHS OCR: This video presentation is intended to raise awareness and provide practical education to HIPAA covered entities and business associates of the HIPAA Security Rule’s Risk Management requirement. Like risk analysis, effective risk management is an essential component of both HIPAA Security Rule compliance and broader cybersecurity preparedness. Risk management is a critical step not only for… Introduction to Malware Binary Triage (IMBT) Course Looking to level up your skills? Get 1...

OCR Releases Risk Management Video From HHS OCR: This video presentation is intended to raise awareness and provide practical education to HIPAA covered entities and business associates of the HIP...

#Malware #News

Origin | Interest | Match

1 0 0 0
Preview
260408 rootshell.online Created on Wed Apr 8 17:00:00 CST 2026 - A news, tutorials and conferences about security published on YouTube - Find the RSS Feed with latest playlists at h...

What’s trending in cybersecurity today? Find out with the latest YouTube playlist we’ve curated. 👀 www.youtube.com/playlist
#Malware #Phishing #IncidentResponse #CyberAwareness #AppSec

0 0 0 0
Preview
Anthropic’s Glasswing initiative raises questions for US cyber operations Anthropic’s decision to hold back a powerful frontier AI model over cybersecurity risks, paired with a new initiative to study its effects on global networks, is prompting discussions about how such tools could reshape hacking operations within the U.S. intelligence community, and how they might be used to identify and exploit weaknesses in adversary systems. Introduction to Malware Binary Triage (IMBT) Course Looking to level up your skills? Get 10% off using coupon code: MWNEWS1...

Anthropic’s Glasswing initiative raises questions for US cyber operations <p>Anthropic’s decision to hold back a powerful frontier AI model over cybersecurity risks, paired with a...

#Malware #News

Origin | Interest | Match

0 0 0 0
Preview
260408 rootshell.online Created on Wed Apr 8 11:00:01 CST 2026 - A news, tutorials and conferences about security published on YouTube - Find the RSS Feed with latest playlists at h...

What’s trending in cybersecurity today? Find out with the latest YouTube playlist we’ve curated. 👀 www.youtube.com/playlist
#Malware #Phishing #IncidentResponse #CyberAwareness #AppSec

0 0 0 0
Preview
Malware Hidden in Blockchain Networks Is Quietly Targeting Developers Worldwide A new investigation has uncovered a cyberattack method that uses blockchain networks to quietly distribute malware, raising concerns among security researchers about how difficult it may be to stop once it spreads further. The threat first surfaced when a senior engineering executive at Crystal Intelligence received a freelance opportunity through LinkedIn. The message appeared routine, asking him to review and run code hosted on GitHub. However, the request resembled a known tactic used by a North Korean-linked group often referred to as Contagious Interview, which relies on fake job offers to target developers. Instead of proceeding, the executive examined the code and found something unusual. Hidden within it was the beginning of a multi-step attack designed to look harmless. A developer following normal instructions would likely execute it without noticing anything suspicious. Once activated, the code connects to blockchain networks such as TRON and Aptos, which are commonly used because of their low transaction costs. These networks do not contain the malware itself but instead store information that directs the program to another blockchain, Binance Smart Chain. From there, the final malicious payload is retrieved and executed. Researchers say this last stage installs a powerful data-stealing tool known as “Omnistealer.” According to analysts working with Ransom-ISAC, the malware is designed to extract a wide range of sensitive data. It can access more than 60 cryptocurrency wallet extensions, including MetaMask and Coinbase Wallet, as well as over 10 password managers such as LastPass. It also targets major browsers like Chrome and Firefox and can pull data from cloud storage services like Google Drive. This means attackers are not just stealing cryptocurrency, but also login credentials and internal access to company systems. What initially looked like a simple phishing attempt turned out to be far more layered. By placing parts of the attack inside blockchain transactions, the attackers have created a system that is extremely difficult to dismantle. Data stored on blockchains cannot easily be removed, which means parts of this malware infrastructure could remain accessible for years. Researchers believe the scale of this operation could grow rapidly. Some have compared its potential reach to the WannaCry ransomware attack, which disrupted hundreds of thousands of systems worldwide. In this case, however, the method is quieter and more flexible, which may allow it to spread further before being detected. At the same time, investigators are still unsure what the attackers ultimately intend to do with the access they gain. Further analysis has revealed possible links to North Korean cyber actors. Investigators traced parts of the activity to an IP address in Vladivostok, a location that has previously appeared in investigations involving North Korean operations. Research cited by NATO has noted that North Korea expanded its internet routing through Russia several years ago. Additional findings from Trend Micro connect similar infrastructure to earlier campaigns involving fake recruiters. The number of affected victims is already significant. Researchers estimate that around 300,000 credentials have been exposed so far, although they believe the real figure could be much higher. Impacted organizations include cybersecurity firms, defense contractors, financial companies, and government entities in countries such as the United States and Bangladesh. The attackers rely heavily on deception to gain access. In some cases, they pose as recruiters and convince developers to run infected code as part of a hiring process. In others, they present themselves as freelance developers and introduce malicious code directly into company systems through platforms like GitHub. Developers in rapidly growing tech ecosystems appear to be a key focus. India, for example, has seen a surge in new contributors on GitHub and ranks among the top countries for cryptocurrency adoption. Researchers suggest that a combination of high developer activity and economic incentives may make such regions more vulnerable to these tactics. Initial contact is typically made through platforms such as LinkedIn, Upwork, Telegram, and Discord. Representatives from these platforms have advised users to be cautious, particularly when asked to download files or execute unfamiliar code outside controlled environments. Not all targeted organizations appear strategically important, which suggests the attackers may be casting a wide net. However, the presence of defense and security-related entities among the victims raises more serious concerns about potential intelligence-gathering objectives. Security experts say this campaign reflects a broader shift in how attacks are being designed. Instead of relying on a single point of failure, attackers are combining social engineering, publicly accessible code platforms, and decentralized infrastructure. The use of blockchain in particular adds a layer of persistence that traditional security tools are not designed to handle. As investigations continue, researchers warn that this may only be an early stage of a much larger problem. The combination of hidden delivery methods, long-term persistence, and unclear intent makes this campaign especially difficult to predict and contain.

Malware Hidden in Blockchain Networks Is Quietly Targeting Developers Worldwide #Developers #GitHub #malware

1 1 1 0
Preview
Malware Threat to Critical Infrastructure Raises Alarms Malware affecting industrial control systems (ICS) has the potential to disrupt key industries underpinning modern society, warns a report...

Malware threats are speeding up across critical infrastructure as legacy systems are exposed. jpmellojr.blogspot.com/2026/04/malw... #Cybersecurity #CriticalInfrastructure #Malware #ICS #Comparitech

0 0 0 0
Preview
Iranian Attackers Are Targeting U.S. Energy, Water Systems, Federal Agencies Say Introduction to Malware Binary Triage (IMBT) Course Looking to level up your skills? Get 10% off using coupon code: MWNEWS10 for any flavor. Enroll Now and Save 10%: Coupon Code MWNEWS10 Note: Affiliate link – your enrollment helps support this platform at no extra cost to you. CISA, the FBI, and other U.S. security agencies are warning that Iran-linked threat groups like CyberAv3ngers are compromising industrial controllers like PLCs to attack critical infrastructure operations in such se...

Iranian Attackers Are Targeting U.S. Energy, Water Systems, Federal Agencies Say Introduction to Malware Binary Triage (IMBT) Course Looking to level up your skills? Get 10% off using coupon code: ...

#Malware #News

Origin | Interest | Match

0 0 0 0
Post image

Iranian Attackers Are Targeting U.S. Energy, Water Systems, Federal Agencies Say CISA, the FBI, and other U.S. security agencies are warning that Iran-linked threat groups like CyberAv3ngers are co...

#Cloud #Security #Cybersecurity #Data #Privacy […]

[Original post on securityboulevard.com]

0 0 0 0
Post image

Iranian Attackers Are Targeting U.S. Energy, Water Systems, Federal Agencies Say CISA, the FBI, and other U.S. security agencies are warning that Iran-linked threat groups like CyberAv3ngers are co...

#Cloud #Security #Cybersecurity #Data #Privacy […]

[Original post on securityboulevard.com]

0 0 0 0
Preview
Dual-Brain Architecture: The Cybersecurity AI Innovation That Changes Everything Introduction to Malware Binary Triage (IMBT) Course Looking to level up your skills? Get 10% off using coupon code: MWNEWS10 for any flavor. Enroll Now and Save 10%: Coupon Code MWNEWS10 Note: Affiliate link – your enrollment helps support this platform at no extra cost to you. Cybersecurity has always been a race, but it is no longer a fair one. Attackers now operate at machine speed, orchestrating campaigns that evolve in seconds, while many defense teams still rely on workflows measu...

Dual-Brain Architecture: The Cybersecurity AI Innovation That Changes Everything Introduction to Malware Binary Triage (IMBT) Course Looking to level up your skills? Get 10% off using coupon code: ...

#Malware #News

Origin | Interest | Match

0 0 0 0
LucidRook Malware Targets Taiwan

~Talos~
UAT-10362 targets Taiwanese NGOs with new Lua-based LucidRook malware via spear-phishing and abused FTP servers.
-
IOCs: 1. 34. 253[. ]131, 59. 124. 71[. ]242, D. 2fcc7078. digimg[. ]store
-
#LucidRook #Malware #ThreatIntel

0 0 0 0
Post image Post image

A very late (due to work travel) csv formatted list of #malspam campaigns that crossed my path in March to include #malware type, subject, hash, c2, and email exfil addresses:

gist.github.com/silence-is-best/440abd3e...

#retrohunt

0 0 0 0
Preview
Chaos malware expands from routers to Linux cloud servers - Help Net Security A new Chaos malware variant is targeting misconfigured cloud servers, adding proxy capabilities, expanding beyond its router-focused origins.

Chaos malware expands from routers to Linux cloud servers

📖 Read more: www.helpnetsecurity.com/2026/04/08/c...

#cybersecurity #cybersecuritynews #cloudsecurity #Linux #malware #DDoS @darktrace.com

0 0 0 0
GitHub & GitLab Phishing Abuse

~Cofense~
Threat actors are increasingly abusing trusted GitHub and GitLab repositories to deliver credential phishing and malware like Remcos RAT.
-
IOCs: Remcos RAT, DcRAT, Muck Stealer
-
#GitHub #Malware #Phishing #threatintel

0 0 0 0
Video

Another talk announcement for BSides Luxembourg!

🤖🔐 𝗔𝗜 𝗔𝗡𝗗 𝗖𝗥𝗬𝗣𝗧𝗢𝗚𝗥𝗔𝗣𝗛𝗬 𝗙𝗢𝗥 𝗘𝗩𝗔𝗦𝗜𝗩𝗘 𝗠𝗔𝗟𝗪𝗔𝗥𝗘 – zhassulan zhussupov aka @cocomelonckz 🧬🔥

Modern malware doesn’t just hide—it adapts.

This talk explores how AI and advanced cryptography are reshaping offensive […]

[Original post on infosec.exchange]

0 1 0 0
Preview
260408 rootshell.online Created on Wed Apr 8 05:00:00 CST 2026 - A news, tutorials and conferences about security published on YouTube - Find the RSS Feed with latest playlists at h...

What’s trending in cybersecurity today? Find out with the latest YouTube playlist we’ve curated. 👀 www.youtube.com/playlist
#Malware #Phishing #IncidentResponse #CyberAwareness #AppSec

0 0 0 0