
Elvis Emeka Ikeji
BYOVD and Remote Tools Used to Deploy Linux Ransomware on Windows
The Qilin ransomware group (also known as Agenda) is utilizing a sophisticated new methodology that deploys Linux ransomware binaries on Windows sy...
Firefox Mandates New Extensions Disclose Data Collection
Starting next week, Mozilla is rolling out a new requirement for all new Firefox extensions to explicitly disclose their personal data collection p...
New "Caminho" Loader Hides Malicious .NET Payloads Inside Image Files
A highly sophisticated new threat, a Loader as a Service platform dubbed "Caminho" (Portuguese for "path"), is actively exploiting a stealthy techn...
2500 Starlink Kits Used by Burmese Scammers Disabled by SpaceX
SpaceX has taken aggressive action against a massive Burmese scam ring, disabling over 2,500 Starlink devices that were suspected of being used by ...
Samsung Galaxy S25 Zero Day Exploited at Pwn2Own to Hijack Camera and GPS
At the recent Pwn2Own Ireland 2025 competition, cybersecurity researchers Ben R. and Georgi G. from Interrupt Labs successfully demonstrated a zero...
Telegram X Hack: New Android Backdoor Steals Credentials and Chat History
A sophisticated new backdoor, dubbed Android.Backdoor.Baohuo.1.origin, has been discovered hidden within maliciously modified versions of the Teleg...
Ghost Network Weaponizes 3K YouTube Videos for Malware
A massive malicious network of YouTube accounts is actively abusing the video platform's popularity and built in trust to spread malware. The netwo...
IIS Servers Hijacked by Exposed ASP.NET Keys
A sophisticated cyberattack campaign is targeting Microsoft Internet Information Services (IIS) servers, exploiting a weakness rooted in decades ol...
Iranian Espionage Campaign Uses Phishing to Attack Diplomatic Missions Globally
The state sponsored Iranian hacker group MuddyWater has launched a campaign targeting over 100 government entities across the Middle East and North...