Tag: EN

MaaS VIP Keylogger Campaign Uses Steganography to Steal Credentials at Scale

A large-scale spear-phishing campaign distributing a VIP Keylogger variant sold as Malware-as-a-Service (MaaS). The campaign employs steganography, in-memory execution, and modular payload design to evade defenses while harvesting credentials across browsers, email clients, and collaboration tools. Researchers observed fraudulent purchase-order emails that…

Apache ZooKeeper Flaw Exposes Sensitive Data to Attackers

Apache ZooKeeper, a centralized service used for maintaining configuration information and naming in distributed systems, has received critical security updates. The Apache Software Foundation recently addressed two “Important” severity vulnerabilities that could expose sensitive data and allow server impersonation in…

Telco Strategies for Consumer Security 2026

As consumer cyber threats continue to evolve – from industrialized scam operations to large-scale abuse of IoT devices – telecom operators are increasingly expected to play… The post Telco Strategies for Consumer Security 2026 appeared first on CUJO AI. This…

ClipXDaemon Malware Targets Crypto Users in Linux X11 Sessions

ClipXDaemon is a new Linux malware family that hijacks cryptocurrency clipboard data in X11 sessions, operating fully offline without any command‑and‑control (C2) infrastructure. It reuses a ShadowHS-style loader built with the public bincrypter framework but delivers a completely different, autonomous…

More AI tools, more burnout! New research explains why

Workflows built around multiple AI agents and constant tool switching are adding cognitive strain across large enterprises. A recent Harvard Business Review analysis describes this pattern as “AI brain fry,” a form of mental fatigue tied to intensive use and…

Cybercrime Group in Vietnam Enables Massive Fraudulent Signups

A wave of fraudulent account registrations to a cybercrime ecosystem operating out of Vietnam. These fake accounts are not just spam; they underpin large-scale financial fraud, phishing, and interpersonal scams that erode trust in online platforms. Attackers scripted mass “puppet”…

Royal Navy races to arm ships against drone threat

Britain’s Ministry of Defence wants a counter-drone system designed, contracted, and delivered within weeks Britain’s Royal Navy is urgently seeking a ship-based counter-drone system and recent world events likely explain why.… This article has been indexed from The Register –…

112 or 22 to 2: Who Moved the Vulnerability Cheese?

AI can now scan codebases and generate hundreds of potential vulnerabilities in minutes. But when 112 bug reports collapse into 22 confirmed flaws and only two exploitable issues, the real disruption is how AI is reshaping the entire vulnerability lifecycle.…

OpenAI joins the race in AI-assisted code security

OpenAI introduced Codex Security⁠, an AI agent that reviews codebases to find, verify, and help fix software vulnerabilities. The launch comes a few weeks after rival Anthropic unveiled its Claude Code Security tool. The feature is available in research preview…