Category: EN

Russian Hackers Target Signal, WhatsApp

Widespread informal use of encrypted consumer apps make them prime target for social engineering-based espionage hacks, Dutch officials say This article has been indexed from Silicon UK Read the original article: Russian Hackers Target Signal, WhatsApp

SurxRAT Android Malware Uses LLMs for Phishing and Data Theft

A new Android Remote Access Trojan (RAT) named SurxRAT, which is being sold as a commercial malware platform through a Telegram-based malware‑as‑a‑service (MaaS) ecosystem. The malware, marketed under the SURXRAT V5 branding, enables cybercriminals to create customized Android malware builds…

Signal Confirms Sophisticated Phishing Scheme Caused Account Compromises

The secure messaging platform Signal recently confirmed active, targeted phishing campaigns resulting in severe account takeovers. These sophisticated attacks have successfully compromised the accounts of high-profile individuals, specifically targeting government officials and journalists. Despite these high-profile breaches, Signal explicitly clarified…

How Piggybacking Attacks Threaten Organizational Security?

Organizations invest heavily in advanced cybersecurity technologies such as endpoint detection, identity access management, zero trust architecture, and continuous monitoring. However, a significant number of security incidents still originate from physical security weaknesses rather than purely digital vulnerabilities. Such often…

GhostClaw Masquerades as OpenClaw in Bid to Plunder Developer Data

A malicious npm package, @openclaw-ai/openclawai, that impersonates the legitimate OpenClaw CLI while quietly deploying a full-featured infostealer and RAT against developers’ machines. Internally branded “GhostLoader,” this threat combines polished social engineering, encrypted payload delivery, and long‑term persistence to exfiltrate almost every…

GhostClaw Mimic as OpenClaw to Steal Everything from Developers

A dangerous malware campaign targeting software developers has surfaced, with a rogue npm package posing as a trusted developer tool to silently drain credentials, crypto wallets, SSH keys, browser sessions, and even iMessage conversations. The package, published under the name @openclaw-ai/openclawai,…

Bug bounties are broken, and the best security pros are moving on

Penetration testing engagements are organized as scheduled contracts with defined scope, set testing windows, and direct communication channels with client teams. Cobalt’s 2026 Pentester Profile Report describes growing preference for penetration testing as a service (PTaaS) and contract-based testing models.…