NFC Exploited to Steal Funds from ATMs and POS
NFC Technology Abused in Global ATM and POS Fraud Cybercriminals, mainly from Chinese underground networks, are using NFC (Near Field Communication) technology to carry out large-scale fraud at ATMs and [...]
TP-Link Router Vulnerabilities Enable Malicious SQL Execution
Cybersecurity researchers have found critical SQL injection vulnerabilities in four TP-Link router models, which could allow attackers to bypass authentication, execute malicious commands, and potentially take control of the devices. [...]
Impersonated Dev Tools on npm/PyPI Used for Credential Theft
The Socket Threat Research Team has discovered three malicious open-source packages—two on PyPI and one on npm—designed to steal sensitive cryptocurrency data like mnemonic seed phrases and private keys. These [...]
Hackers Leverage Cloudflare for RAT Deployment
Hackers have been using Cloudflare tunnels since February 2024 to host malware and spread remote access trojans like AsyncRAT, according to Sekoia TDR. Complex malware attacks are using phishing emails [...]
Infostealer Malware Surges 84% in Phishing Emails, IBM Warns
A recent report from IBM X-Force reveals that infostealer malware delivered through phishing emails has spiked by 84% week-over-week in 2024. This surge highlights a shift in cyberattack strategies, with [...]
Get Social