Category: Cyber Security


  • Termite Ransomware Linked to ClickFix and CastleRAT Attacks

    Security researchers recently uncovered a new intrusion chain connected to Termite ransomware activity. The operation relies on social engineering and legitimate Windows tools to infiltrate networks. Instead of exploiting software vulnerabilities, attackers manipulate victims into running malicious commands themselves. The campaign uses a technique known as ClickFix. This method tricks users into executing commands that…

  • Fake CleanMyMac Website Spreads macOS Infostealer Malware

    Cybercriminals are targeting Apple users through a fake CleanMyMac website that spreads macOS malware. The campaign tricks victims into installing malicious software disguised as a trusted system tool. Attackers created a convincing website that imitates the legitimate CleanMyMac download page. Many users search online for the utility when trying to clean or optimize their devices.…

  • Qilin Ransomware Claims Attack on US Power Grid Provider

    A ransomware group known as Qilin ransomware claims it breached a US electricity provider. The allegation raises concerns about cyber threats targeting critical energy infrastructure. The group posted the claim on its dark web leak site. According to the post, the attackers gained access to internal data belonging to the utility company. Authorities and cybersecurity…

  • Operation Candy Uncovers Global Crime Network Through Seized Phones

    A police investigation in Sweden uncovered a large criminal network after authorities analyzed two seized mobile phones. The discovery triggered an international investigation known as Operation Candy. Investigators initially focused on a suspected drug trafficker in a small Swedish town. Digital forensic experts later extracted valuable data from the suspect’s devices. That information revealed communication…

  • FBI Cyberattack Targets Wiretap Network

    A cyberattack targeting an FBI surveillance platform has raised concerns about the security of sensitive investigative systems. The intrusion involved infrastructure used to manage lawful wiretap operations and electronic surveillance requests. Because the system plays a critical role in criminal investigations, the incident quickly drew attention from security analysts. Officials confirmed that suspicious activity was…

  • Amazon Outage Disrupts US Shopping Site

    Thousands of shoppers across the United States experienced disruptions after an Amazon outage affected the company’s online shopping platform. Users reported problems accessing product pages, completing purchases, and using the mobile application. The spike in complaints quickly appeared on outage-tracking platforms as customers attempted to place orders. Although the disruption lasted only a few hours,…

  • Seedworm Hackers Target US Critical Networks

    Security researchers warn that Seedworm hackers linked to Iran have infiltrated networks connected to US and Israeli organizations. Investigators discovered unauthorized access across several industries, including banking, aviation, and technology. The activity suggests the attackers are establishing long-term access inside strategic systems. The campaign highlights how state-linked threat groups continue targeting critical infrastructure. Analysts believe…

  • GitHub Malware Campaign Steals Browser Passwords

    Security researchers uncovered a GitHub malware campaign that uses fake repositories to distribute password-stealing malware. The malicious projects appear legitimate and encourage users to download software tools or utilities. Once installed, the malware begins collecting sensitive information stored on the victim’s system. The campaign targets browser credentials, cryptocurrency wallets, and messaging tokens. Because the files…

  • Browser Extensions Malware Risk Allows Download Manipulation

    Millions of users rely on browser extensions every day for convenience and productivity. Security researchers now warn that these tools can introduce a serious threat. A recent study shows that extensions can secretly modify downloaded files and replace them with malware. This discovery places browser extensions malware risk under renewed scrutiny. The problem does not…

  • Online gambling ring exploited Ukrainian women in betting fraud

    An online gambling ring that exploited vulnerable Ukrainian women has been dismantled by law enforcement authorities. Investigators say the criminal group used displaced women to support a large financial fraud scheme targeting betting platforms. The operation relied on bank accounts opened in the victims’ names. Criminals used these accounts to move money generated through automated…