Category: EN

Android Malware Mimic As DeepSeek To Steal Users Login Credentials

A sophisticated Android banking trojan known as OctoV2 has been discovered masquerading as the legitimate DeepSeek AI application. The malware campaign uses a deceptive phishing website that closely mimics the official DeepSeek platform, tricking users into downloading a malicious application…

Popular GitHub Action Targeted in Supply Chain Attack

The tj-actions/changed-files GitHub Action, which is used in 23,000 repositories, has been targeted in a supply chain attack. The post Popular GitHub Action Targeted in Supply Chain Attack appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…

Medusa Ransomware Hits Critical Infrastructure

Medusa ransomware group has affected more than 300 critical infrastructure organisations in US alone, warn CISA, FBI, MS-ISAC This article has been indexed from Silicon UK Read the original article: Medusa Ransomware Hits Critical Infrastructure

European Parliament Bans Huawei Lobbyists After Arrests

European Parliament bans Huawei lobbyists after police make arrests in corruption probe around company’s links to to European Parliament This article has been indexed from Silicon UK Read the original article: European Parliament Bans Huawei Lobbyists After Arrests

Global Smartwatch Sales Fall For First Time

Worldwide smartwatch sales see first-ever decline as market leader Apple records 19 percent year-over-year drop This article has been indexed from Silicon UK Read the original article: Global Smartwatch Sales Fall For First Time

Hackers Exploit Tomcat Vulnerability to Hijack Apache Servers

A recent and significant cybersecurity threat has emerged involving a critical vulnerability in Apache Tomcat, identified as CVE-2025-24813. This vulnerability allows for remote code execution, potentially allowing hackers to hijack servers running Apache Tomcat. The exploitation of this vulnerability is…

Hackers Exploiting CSS to Evade Spam Filters & Track User Actions

Researchers have identified a concerning trend where threat actors are increasingly abusing Cascading Style Sheets (CSS) to bypass spam detection systems and covertly track user behaviours.  Observed from the second half of 2024 through February 2025, these sophisticated techniques leverage…