Home Malware Attack News

Malware Attack News

Our Malware Attack News category keeps you informed about the latest threats affecting systems worldwide. From ransomware outbreaks to spyware and trojans, we provide up-to-the-minute updates on malware trends and their impact on businesses and individuals.

Our expert insights help you understand how these attacks happen and what steps to take to protect your data. Get detailed analyses of high-profile malware campaigns, emerging vulnerabilities, and cybersecurity defenses.

Cyber Threats of 2024

Top Sophisticated Cyber Security Threats of 2024

As 2024 concludes, cybersecurity experts are reflecting on an eventful Q4 that witnessed evolving threats and heightened activity in the malware landscape. ANY.RUN, a leading interactive malware analysis platform, has released its quarterly report, shedding...
deploy Malware Using ScreenConnect

Hackers Deploy AsyncRAT and SectopRAT Using ScreenConnect Software on Windows

Cybercriminal groups are increasingly blending new and traditional techniques to steal sensitive information from unsuspecting users by deploying remote access tools (RATs) such as AsyncRAT and SectopRAT. Recent activity in the cyber threat landscape highlights...
Red Team Tools in RDP Attacks

Hackers Leverage Red Team Tools in RDP Attacks Via TOR & VPN for Data...

In a striking display of cyber sophistication, the advanced persistent threat (APT) group Earth Koshchei, also tracked as APT29 or Midnight Blizzard, has been linked to a massive rogue Remote Desktop Protocol (RDP) campaign. Earth...
malicious Google Search Ads

Hackers Exploiting Google Search Ads to Launch Malvertising Campaigns

Threat researchers have identified a persistent series of malvertising campaigns targeting graphic design professionals, using Google Search ads as a vector. This campaign, active since at least November 13, 2024, exploits two dedicated IP...
Hackers Attacking Employees With Weaponized Google Drive Links To Deliver Malware

Hackers Weaponize Google Drive Links to Breach Corporate Networks

A sophisticated attack campaign targeting organizations in Japan and other East Asian countries. The threat actor, identified as APT-C-60, is employing a clever social engineering tactic that exploits job application processes to infiltrate corporate...
Radiant Hacked

Radiant Hacked – $50 Million USD Worth Crypto Stolen by North Korean Hackers

Radiant Capital, a prominent decentralized finance (DeFi) protocol, has fallen victim to a major security breach, resulting in the loss of approximately $50 million USD. The attack, which exploited vulnerabilities in the devices of...
MediaTek Bluetooth Chipset Vulnerabilities

Critical MediaTek Bluetooth Chipset Vulnerabilities Impacted 1.5 Billion+ Android Users

A series of security vulnerabilities have been identified in MediaTek chipsets, affecting several Android versions and other related software platforms. MediaTek leads the market in powering Android tablets and smart-feature phones and ranks as...
North Korean Hacking Group Launches Undected Malwareless URL Phishing Attacks

North Korean Hacking Group Launches Undected Malwareless URL Phishing Attacks

Researchers from South Korea have discovered that the notorious North Korean hacking group, known as Kimsuky, has adapted its phishing tactics to use malwareless phishing attack tactics, which evade major EDR detection. The group, which...
Rockstar 2FA

“Rockstar 2FA” Phishing-as-a-Service Steals Microsoft 365 Credentials Via AiTM Attacks

Cybersecurity researchers have identified a concerning link between the advanced phishing toolkit known as 'Rockstar 2FA' and a surge in adversary-in-the-middle (AiTM) phishing attacks. Highly advanced methods are used in these campaigns to trick people...
GPU DDK Vulnerabilities

Critical GPU DDK Vulnerabilities Allow Attackers to Execute Arbitrary Code in Physical Memory

A significant development for the tech community is the identification of 2 critical vulnerabilities in several versions of a widely-used GPU Driver Development Kit (DDK) that affect systems using Unified Memory Architecture (UMA). On...

Recent Posts

CyTwist Launches Advanced Security Solution to identify AI-Driven Cyber Threats in...

CyTwist, a leader in advanced next-generation threat detection solutions, has launched its patented detection engine to combat the insidious rise of AI-generated malware. The cybersecurity...