Category Malware & Exploits

Malware in Fake GitHub Repos Harvests Crypto Wallet Credentials

An investigation on July 26, 2025 uncovered a widespread campaign involving fake GitHub repositories distributing malware strains such as RedLine and DeerStealer, designed to harvest cryptocurrency wallet credentials. The open source malware operation infiltrated developers and investors seeking blockchain tools—and leveraged open source software security gaps to propagate the malware.…

Read MoreMalware in Fake GitHub Repos Harvests Crypto Wallet Credentials

Lynx Group Ransomware Attack on iBUYPOWER Signals Rising Ransomware Threats

The ransomware threats landscape escalated on July 22, 2025, when the Lynx group launched a devastating attack on gaming PC manufacturer iBUYPOWER and its sister brand HYTE. The attackers encrypted internal systems and exfiltrated sensitive data, threatening public release unless ransom demands were met. This computer ransomware incident echoes broader trends in…

Read MoreLynx Group Ransomware Attack on iBUYPOWER Signals Rising Ransomware Threats

Remote Access Trojan CHAOS RAT Infiltrates Arch Linux AUR Packages

On July 21, 2025, security researchers uncovered three malicious Arch Linux AUR packages deploying the remote access trojan known as CHAOS RAT, targeting both mobile and desktop systems. These packages, disguised as legitimate tools, covertly install backdoors enabling attackers to hijack user systems remotely. This article explores the exploit’s technical mechanics, widespread…

Read MoreRemote Access Trojan CHAOS RAT Infiltrates Arch Linux AUR Packages

Node.js Vulnerability: Windows Device Name Path Traversal Exposes Credentials

The Node.js vulnerability CVE‑2025‑27210, disclosed on July 15, 2025, allows attackers to exploit Windows reserved device names (CON, PRN, AUX) to bypass path traversal protections and access sensitive files. This article unpacks the flaw, its real‑world consequences, and actionable mitigation guidance for developers and security teams. A Deep Dive into…

Read MoreNode.js Vulnerability: Windows Device Name Path Traversal Exposes Credentials

BADBOX 2.0 Botnet: Android IoT Devices Turned into Global Fraud Hubs

A stealthy malware campaign has compromised over one million Android IoT devices, transforming them into a massive BADBOX 2.0 botnet. Uncovered in 2025, this threat lurks in devices like smart TVs and streaming boxes, enabling fraud and cyberattacks across 222 countries. Here’s how it works, its impact, and steps to…

Read MoreBADBOX 2.0 Botnet: Android IoT Devices Turned into Global Fraud Hubs

WordPress Malware Masquerades as Cloudflare on E-Commerce Checkout Pages

A sly WordPress malware campaign, spotted in June 2025, targets e-commerce sites by posing as Cloudflare’s verification prompt on checkout pages. Sucuri researchers warn it steals payment details, hitting online retailers hard. This article breaks down the attack, its fallout, and quick steps to secure WordPress stores. Fake Cloudflare Trick…

Read MoreWordPress Malware Masquerades as Cloudflare on E-Commerce Checkout Pages

The 16 Billion Credential Leak: How Info stealer Malware is Redefining Data Breach Risks

A massive data breach exposing 16 billion login credentials has sent shockwaves through the cybersecurity world, marking one of the largest leaks in history. Discovered by researchers at Cybernews in June 2025, this colossal credential leak spans 30 datasets, compromising accounts across platforms like Google, Apple, Facebook, and even government…

Read MoreThe 16 Billion Credential Leak: How Info stealer Malware is Redefining Data Breach Risks