Category Cyber Attacks

TamperedChef Infostealer Spread via Fraudulent PDF Editor Ads

Security researchers have uncovered a large-scale malware campaign distributing an infostealer dubbed TamperedChef through fake PDF editing applications. The campaign relied on Google ads to drive victims to fraudulent websites hosting malicious downloads, blending legitimate branding with carefully timed activation of hidden payloads. How the Campaign Works According to researchers,…

Read MoreTamperedChef Infostealer Spread via Fraudulent PDF Editor Ads

Malicious NPM Packages Stole Chrome User Data on Windows

Security analysts from JFrog have identified eight malicious NPM packages designed to steal sensitive information from Google Chrome users on Windows systems. The discovery highlights a growing risk in the software supply chain, where attackers weaponize widely used developer tools to target unsuspecting users. How the Attack Worked JFrog researchers…

Read MoreMalicious NPM Packages Stole Chrome User Data on Windows

macOS Supply Chain Attack “s1ngularity” Steals Thousands of Developer Credentials

Security researchers uncovered a supply chain attack targeting macOS developers that compromised thousands of credentials. The campaign, dubbed “s1ngularity,” exploited versions 20.9.0 to 21.8.0 of Nx, a popular open-source build framework, according to analysis from GitGuardian. The breach highlights the growing overlap between macOS attacks and the broader ecosystem of…

Read MoremacOS Supply Chain Attack “s1ngularity” Steals Thousands of Developer Credentials

AgentFlayer Exploit Targets ChatGPT Connectors to Steal Third-Party App Data

Security researchers just dropped a bombshell about ChatGPT’s newest feature – the AgentFlayer exploit can silently steal your sensitive data from Google Drive, SharePoint, and other connected services without you even knowing it happened. This zero-click attack uses “poisoned” documents loaded with hidden prompt injections that trick ChatGPT into exfiltrating…

Read MoreAgentFlayer Exploit Targets ChatGPT Connectors to Steal Third-Party App Data

Chaos RaaS Emerges After BlackSuit Takedown, Demanding $300K from U.S. Victims

The Chaos RaaS operation has emerged from the ashes of the BlackSuit ransomware takedown, with former gang members launching a fresh wave of attacks targeting American businesses. Law enforcement’s seizure of BlackSuit’s dark web infrastructure didn’t eliminate the threat – it just forced these cybercriminals to rebrand and adapt their…

Read MoreChaos RaaS Emerges After BlackSuit Takedown, Demanding $300K from U.S. Victims

Scattered Spider Attack Targets VMware ESXi with Ransomware

Google’s threat intelligence team dropped alarming details this week about a massive Scattered Spider attack campaign targeting VMware ESXi hypervisors across American corporate networks. The notorious cybercriminal group has been systematically launching ransomware attacks against retail chains, airlines, and insurance companies, using nothing more than smooth-talking phone calls to IT…

Read MoreScattered Spider Attack Targets VMware ESXi with Ransomware

Gunra Ransomware Mimics Conti in Global Windows Attacks

Gunra ransomware has drawn the attention of cybersecurity researchers for its alarming resemblance to Conti, a now-defunct ransomware-as-a-service (RaaS) operation dismantled in 2022. Experts believe Gunra’s developers may be repurposing Conti’s leaked codebase, long circulated across cybercrime forums. Its behavior—automated encryption, shadow copy deletion, and nearly identical ransom notes—mirrors Conti’s…

Read MoreGunra Ransomware Mimics Conti in Global Windows Attacks

Malware in Fake GitHub Repos Harvests Crypto Wallet Credentials

An investigation on July 26, 2025 uncovered a widespread campaign involving fake GitHub repositories distributing malware strains such as RedLine and DeerStealer, designed to harvest cryptocurrency wallet credentials. The open source malware operation infiltrated developers and investors seeking blockchain tools—and leveraged open source software security gaps to propagate the malware.…

Read MoreMalware in Fake GitHub Repos Harvests Crypto Wallet Credentials