A North Korea-linked hacking group known as Void Dokkaebi, also tracked as Famous Chollima, is running a campaign that tricks software developers into installing malware through fake job interviews. The group lures developers into cloning infected code repositories as part…
Tag: Cyber Security News
Hackers Use Pastebin-Hosted PowerShell Script to Steal Telegram Sessions
Cybersecurity researchers have uncovered a purpose-built PowerShell script hosted on Pastebin that is designed to silently steal Telegram session data from both desktop and web-based clients. The script is disguised as a routine Windows system update, making it easy for…
Hackers Use Fake CAPTCHA Pages to Trigger Costly International SMS Fraud
Most internet users are familiar with CAPTCHA tests, simple challenges like selecting traffic lights or typing distorted letters to confirm they are human. But cybercriminals have found a way to weaponize this process. Hackers are now building fake CAPTCHA pages…
Hackers Abuse Compromised Routers to Hide China-Linked Cyber Operations
A new and fast-moving cyber threat has emerged, where hackers linked to China are quietly building large networks of compromised routers and edge devices to carry out covert cyber operations against organisations around the world. Rather than setting up their…
Hackers Can Exploit Ollama Model Uploads to Leak Sensitive Server Data
A critical, unpatched vulnerability has been discovered in Ollama, a widely used open-source platform for running Large Language Models locally. Tracked as CVE-2026-5757, this severe memory leak allows unauthenticated remote attackers to extract sensitive data directly from a server’s heap.…
Udemy Data Breach – ShinyHunters Allegedly Claims Compromise of 1.4M User Records
The notorious cybercriminal group ShinyHunters has claimed responsibility for a major data breach targeting Udemy, Inc. (udemy.com), one of the world’s largest online learning platforms, and has alleged the compromise of over 1.4 million records containing personally identifiable information (PII)…
Python Vulnerability Allows Out-of-Bounds Write on Windows Systems
A security vulnerability has been discovered in Python’s Windows asyncio implementation, allowing attackers to trigger out-of-bounds memory writes through a missing boundary check in network socket operations. The vulnerability, tracked as CVE-2026-3298, carries a high severity rating. It exclusively affects Windows platforms and was publicly…
Xiongmai IP Camera Vulnerability Let Attackers Bypass Authentication and have Remote Access
Security cameras are designed to keep commercial facilities safe. However, a newly disclosed critical vulnerability in Hangzhou Xiongmai Technology’s XM530 IP Cameras is putting networks at risk. Tracked under the alert code ICSA-26-113-05 and officially designated as CVE-2025-65856, this flaw…
Ransomware Hackers Develop Custom Exfiltration Tool to Steal Sensitive Data
Ransomware attackers are no longer relying only on widely known tools to steal data. Affiliates linked to the Trigona ransomware group have taken a more calculated approach by building their own custom data exfiltration tool, one that gives them greater…
Hackers Use Telegram Bots to Track 900+ Successful React2Shell Exploits
A newly exposed server has revealed how a threat actor used automated tools, AI assistance, and Telegram bots to silently hack into more than 900 companies around the world. The operation, built around a tool called “Bissa scanner,” targeted internet-facing…
Hackers Abuse SS7 and Diameter Protocols to Track Mobile Users Worldwide
A major investigation has revealed that sophisticated threat actors are exploiting fundamental vulnerabilities in global mobile networks to track users worldwide. By abusing legacy 3G SS7 and 4G Diameter signaling protocols, hackers are successfully bypassing telecom firewalls to conduct silent,…
Microsoft Teams Issue Blocking Users From Joining Meetings Following Edge browser update
Microsoft is actively investigating a known issue preventing some users from joining Microsoft Teams meetings on Windows devices, following a recent update to the Microsoft Edge browser. The disruption is affecting organizations, including those using NHSmail infrastructure, with reports indicating…
Hackers Leverage Microsoft Teams to Breach Organizations Posing as IT Helpdesk Staff
A newly identified threat group, UNC6692, has been caught running a sophisticated multistage intrusion campaign that uses Microsoft Teams impersonation, a custom modular malware suite, and cloud infrastructure abuse to deeply penetrate enterprise networks, all without exploiting a single software…
Malicious npm Package Turns Hugging Face Into Malware CDN and Exfiltration Backend
A rogue npm package named js-logger-pack has been caught quietly turning Hugging Face, a widely trusted AI model hosting platform, into both a malware delivery network and a stolen data storage backend. The campaign marks a clear shift in how attackers abuse…
North Korean Hackers Use Fake IT Worker Scheme to Infiltrate Companies and Evade Sanctions
North Korea has been running one of the most quietly effective cyber fraud operations in recent years. State-sponsored operatives working for the Pyongyang regime have been posing as legitimate remote IT workers to get hired by companies around the world,…
AI-Assisted Lazarus Campaign Targets Developers With Backdoored Coding Challenges
A North Korean state-sponsored threat group is running an active campaign that tricks software developers into installing malware through fake job interviews and rigged coding tests. The group, tracked by cybersecurity firm Expel as HexagonalRodent (also called Expel-TA-0001), is widely…
Bitwarden CLI Compromised in Supply Chain Attack via GitHub Actions
Socket has confirmed that Bitwarden CLI version 2026.4.0 was compromised as part of the ongoing Checkmarx supply chain campaign, exposing millions of users and thousands of enterprises to credential theft and CI/CD pipeline infiltration. The attack targeted @bitwarden/cli 2026.4.0 on…
Fake TradingView AI Agent Site is Delivering Needle Stealer Malware via Fake TradingClaw
A new malware campaign is tricking traders into downloading a data-stealing tool by impersonating the popular financial platform TradingView. Attackers set up a fake website promoting something called TradingClaw, which they describe as an AI-powered trading assistant. Once a visitor…
Hackers Abuse Fake Wallpaper App and YouTube Channel to Spread notnullOSX Malware
A new macOS malware called notnullOSX has surfaced in early 2026, specifically built to steal cryptocurrency from Mac users who hold digital assets worth more than $10,000. The threat is real, active, and carefully constructed to look completely legitimate at…
Hackers Use Outlook Mailboxes to Hide Linux GoGra Backdoor Communications
A nation-state-linked hacking group has found a clever way to hide its malicious activity inside Microsoft Outlook mailboxes, making its attacks much harder to detect by standard security tools. The Harvester APT group, believed to be a nation-state-backed threat actor…