Infostealers: How to Detect, Remove and Prevent Information-Stealing Malware in 2025
Information is one of our most valuable assets in today's digital world, making it a prime target for cybercriminals. These threat actors use specialized infostealer malware to extract sensitive data…
GameOver(lay) Vulnerabilities Endanger 40% of Ubuntu Users
Cloud security researchers have discovered two easily exploitable privilege escalation vulnerabilities called GameOver(lay) in the Ubuntu OverlayFS module. These vulnerabilities could affect 40% of Ubuntu users. What is OverlayFS? OverlayFS…
Google Is Working on an Information Security Project Called Web Integrity API
A team of four Google engineers is working on a new project called the Web Environment Integrity API, which will allow sites to block client applications that change their code.…
Decoy Dog Malware Uncovered: Next-Gen Spyware
A group of hackers, presumably state-sponsored, is actively developing and beginning to use a sophisticated Decoy Dog toolkit. It has likely been used for over a year in cyber intelligence…
FraudGPT Offers Phishing Email Generation to Cybercriminals
It's not just IT companies racing to develop AI-powered chatbots. Cybercriminals have also joined the fray. Recent reports indicate that a developer has built a dangerous AI chatbot called "FraudGPT"…
Google Creates a Red Team to Attack AI Systems
Google says it is creating a red team that will specialize in "sophisticated technical attacks on AI systems." Among examples of such attacks, the company's report lists prompt engineering, extracting…
Information Security Threats in Social Media
Social media has become an important aspect of our everyday lives in this age of technology and information. Despite its numerous advantages, social media has raised concerns about protecting personal…
Ivanti 0-day exploited to target Norwegian government
Software development company Ivanti (formerly MobileIron Core) has patched a zero-day vulnerability that allowed authentication bypass. This vulnerability had a maximum CVSS level and was actively exploited to gain unauthorized…
Luca Stealer Spreads Via a Phishing Microsoft Crypto Wallet Site
With the ever-increasing number of cyber threats, hackers and cybersecurity specialists are taking the initiative. This time, cybercriminals went ahead of the curve. They created a phishing website to coincide…
Trojan HotRat Is Distributed through Pirated Versions of Software and Games
Avast experts have warned that a new variant of AsyncRAT malware, called HotRat, is distributed through pirated versions of popular programs and utilities. This includes games, Microsoft Office, and audio…
Gozi and IcedID Trojans Spread via Malvertising
Malvertising on Google Search is an unpleasant occurrence where malicious ads appear in search engine results. These ads are meant to help users find relevant information. But unfortunately, some cybercriminals…
Vulnerability in WordPress Plugin WooCommerce Payments Is Actively Used to Hack Sites
Hackers use a vulnerability in the widely used WooCommerce Payments WordPress plugin to gain privileges of any user, including administrator, on vulnerable sites. WooCommerce Payments is a popular WordPress plugin…
