Security researchers recently uncovered a new intrusion chain connected to Termite ransomware activity. The operation relies on social engineering and legitimate Windows tools to infiltrate networks. Instead of exploiting software vulnerabilities, attackers manipulate victims into running malicious commands themselves. The campaign uses a technique known as ClickFix. This method tricks users into executing commands that…
Cybercriminals are targeting Apple users through a fake CleanMyMac website that spreads macOS malware. The campaign tricks victims into installing malicious software disguised as a trusted system tool. Attackers created a convincing website that imitates the legitimate CleanMyMac download page. Many users search online for the utility when trying to clean or optimize their devices.…
A ransomware group known as Qilin ransomware claims it breached a US electricity provider. The allegation raises concerns about cyber threats targeting critical energy infrastructure. The group posted the claim on its dark web leak site. According to the post, the attackers gained access to internal data belonging to the utility company. Authorities and cybersecurity…
A police investigation in Sweden uncovered a large criminal network after authorities analyzed two seized mobile phones. The discovery triggered an international investigation known as Operation Candy. Investigators initially focused on a suspected drug trafficker in a small Swedish town. Digital forensic experts later extracted valuable data from the suspect’s devices. That information revealed communication…
A cyberattack targeting an FBI surveillance platform has raised concerns about the security of sensitive investigative systems. The intrusion involved infrastructure used to manage lawful wiretap operations and electronic surveillance requests. Because the system plays a critical role in criminal investigations, the incident quickly drew attention from security analysts. Officials confirmed that suspicious activity was…
Thousands of shoppers across the United States experienced disruptions after an Amazon outage affected the company’s online shopping platform. Users reported problems accessing product pages, completing purchases, and using the mobile application. The spike in complaints quickly appeared on outage-tracking platforms as customers attempted to place orders. Although the disruption lasted only a few hours,…
Security researchers warn that Seedworm hackers linked to Iran have infiltrated networks connected to US and Israeli organizations. Investigators discovered unauthorized access across several industries, including banking, aviation, and technology. The activity suggests the attackers are establishing long-term access inside strategic systems. The campaign highlights how state-linked threat groups continue targeting critical infrastructure. Analysts believe…
Security researchers uncovered a GitHub malware campaign that uses fake repositories to distribute password-stealing malware. The malicious projects appear legitimate and encourage users to download software tools or utilities. Once installed, the malware begins collecting sensitive information stored on the victim’s system. The campaign targets browser credentials, cryptocurrency wallets, and messaging tokens. Because the files…
Millions of users rely on browser extensions every day for convenience and productivity. Security researchers now warn that these tools can introduce a serious threat. A recent study shows that extensions can secretly modify downloaded files and replace them with malware. This discovery places browser extensions malware risk under renewed scrutiny. The problem does not…
An online gambling ring that exploited vulnerable Ukrainian women has been dismantled by law enforcement authorities. Investigators say the criminal group used displaced women to support a large financial fraud scheme targeting betting platforms. The operation relied on bank accounts opened in the victims’ names. Criminals used these accounts to move money generated through automated…