Free OnlyFans Lure Used to Spread Cross-Platform CRPx0 Malware
CRPx0 uses a free OnlyFans lure to deliver stealthy malware that steals cryptocurrency, exfiltrates data, and deploys ransomware via persistence and C2 control.
Malicious Hugging Face model masquerading as OpenAI release hits 244K downloads
Malicious Hugging Face model repos can impersonate legitimate releases, inflate popularity, and deliver credential-stealing malware to Windows systems through deceptive setup files.
Ongoing supply chain attacks worm into SAP npm packages
Supply chain attacks have compromised multiple npm packages, including those from SAP and Intercom, with credential-stealing malware affecting developers.
Ongoing supply chain attacks worm into SAP npm packages
Supply chain attacks have compromised multiple npm packages, including those from SAP and Intercom, with credential-stealing malware affecting developers.
Fake OpenAI Privacy Filter Repo Hits #1 on Hugging Face, Draws 244K Downloads
A typosquatted Hugging Face repo impersonated OpenAI’s Privacy Filter and delivered a Rust-based Windows infostealer via loader scripts and PowerShell execution.
Stealthy malware abuses Microsoft Phone Link to siphon SMS OTPs from enterprise PCs
A new .NET trojan and Pheno plugin exploit Microsoft's Phone Link to capture mobile authentication codes from Windows systems without compromising phones.
Open-source registries hit by 'Mini Shai-Hulud' supply chain attacks
The 'Mini Shai-Hulud' worm targets developer credentials across multiple ecosystems, exploiting vulnerabilities in popular packages to steal sensitive information.
Open-source registries hit by 'Mini Shai-Hulud' supply chain attacks
The 'Mini Shai-Hulud' worm targets developer credentials across multiple ecosystems, exploiting vulnerabilities in popular packages to steal sensitive information.
Hugging Face, ClawHub Abused for Malware Distribution
Threat actors exploit AI distribution platforms to distribute malware through trojanized shared files, relying on social engineering tactics to deceive users.
China-Linked APT GopherWhisper Abuses Legitimate Services in Government Attacks
GopherWhisper is a newly identified APT using legitimate services for command-and-control communication and data exfiltration, primarily targeting a Mongolian government entity.
The Bitwarden CLI NPM package was compromised, enabling credential theft through a malicious payload targeting various cloud services and GitHub repositories.
The Bitwarden CLI NPM package was compromised, enabling credential theft through a malicious payload targeting various cloud services and GitHub repositories.
Another npm supply chain worm hits dev environments
A new npm supply-chain attack targets developer workflows, compromising multiple packages and stealing sensitive data, with similarities to previous CanisterWorm infections.
Another npm supply chain worm hits dev environments
A new npm supply-chain attack targets developer workflows, compromising multiple packages and stealing sensitive data, with similarities to previous CanisterWorm infections.
Google Antigravity in Crosshairs of Security Researchers, Cybercriminals
Google Antigravity's vulnerabilities have attracted both security researchers and cybercriminals, leading to risks of remote code execution and malware delivery.
SystemBC C2 Server Reveals 1,570+ Victims in The Gentlemen Ransomware Operation
The Gentlemen ransomware group uses SystemBC malware to target over 1,570 victims, employing sophisticated tactics for initial access and lateral movement.
Dozens of Malicious Crypto Apps Land in Apple App Store
Over two dozen fake cryptocurrency apps targeting iOS users have been found in the Apple App Store, aimed at stealing recovery phrases and private keys.
Malicious WordPress Plugins with Backdoors Compromise Thousands of Websites
Malicious WordPress plugins with backdoors compromised thousands of websites, demonstrating a supply-chain attack and leading to their permanent removal.