- Iran-linked MuddyWater deploys Dindoor malware against U.S. organizations 2026-03-07 00:38 Security Affairs Iran-linked MuddyWater deploys Dindoor malware against U.S. organizations Iran-linked APT MuddyWater targeted U.S. organizations, deploying the new Dindoor backdoor across sectors including banks, airports, and nonprofits. Broadcom’s Symantec Threat Hunter …
- Targeted advertising is also targeting malware 2026-03-06 13:38 Computerworld Among the malware attacks leveraging ads, the company pointed to Ghost Cat, Click Fix and SocGholish but there are several new techniques in the pipeline. In future, the company said, we can expect to see new attacks developing, including AI-assisted …
- That attractive online ad might be a malware trap 2026-03-06 09:45 Help Net Security Malware increasingly travels through the infrastructure that delivers online advertising. The Media Trust’s Global Report on Digital Trust, Ad Integrity, and the Protection of People describes a digital ad ecosystem where scam campaigns, malicious …
- Microsoft warns of new signed malware which deploys remote monitoring tools as backdoors 2026-03-06 08:51 TechRadar Follow us Add us as a preferred source on Google Newsletter Tech Radar Get the TechRadar Newsletter Sign up for breaking news, reviews, opinion, top tech deals, and more. You are now subscribed Your newsletter sign-up was successful Subscribe to our …
- Chinese hackers hide malware within Windows and Google Drive to hit government targets 2026-03-06 08:33 TechRadar Follow us Add us as a preferred source on Google Newsletter Tech Radar Get the TechRadar Newsletter Sign up for breaking news, reviews, opinion, top tech deals, and more. You are now subscribed Your newsletter sign-up was successful Subscribe to our …
- Hackers exploit OpenClaw to spread malware via GitHub - and a little help from Bing 2026-03-06 08:27 TechRadar Follow us Add us as a preferred source on Google Newsletter Tech Radar Get the TechRadar Newsletter Sign up for breaking news, reviews, opinion, top tech deals, and more. You are now subscribed Your newsletter sign-up was successful Subscribe to our …
- Malware attack delays National Quarry financials 2026-03-06 02:25 Trinidad and Tobago Guardian A malware attack has delayed audits into the financial statements of National Quarries Company. It was revealed before a Public Accounts (Enterprises) Committee on Wednesday, that the Ministry of Finance had only received …
- Fake Zoom, Teams Meeting Invites Use Compromised Certificates to Drop Malware 2026-03-04 21:27 Hackread A clever new wave of phishing attacks is hitting office workers where they feel safest- their daily meeting invites. Instead of using obvious malware, hackers are now using stolen digital certificates to trick computers into trusting malicious files. …
- Mossad, Malware, and Media: How a Pakistani TV Channel Got Hacked for Psychological Warfare 2026-03-04 09:40 Daily Pakistan As a cybersecurity researcher, I spend my life staring at network logs, threat patterns, and systemic vulnerabilities. I am used to digital skirmishes taking place silently in the shadows of server racks. But on the night Geo TV and the Tamasha streaming …
- Scareware scams: dodgy pop-ups containing malware 2026-03-04 03:45 Which? Scareware pop-ups, or notifications, suddenly appear on your device and tell you that it has been infected with malware - but don't worry, these can be ignored. Some reports of these scams claim the pop-ups appear with loud alert noises telling you …
- Microsoft Flags Malware Delivery Tied to OAuth Login Phishing Campaign 2026-03-04 01:11 Android Headlines Microsoft has warned that hackers are exploiting a feature within OAuth to launch a sophisticated phishing campaign. The hackers reportedly aim to deliver malware instead of simply stealing login details. They abuse a legitimate redirect function to move …
- CISA report updates findings on RESURGE malware attacks 2026-03-04 00:04 American Hospital Association The Cybersecurity and Infrastructure Security Agency Feb. 26 released a report that updates findings from last year on RESURGE malware used to gain covert access to Ivanti Connect Secure devices. The new analysis includes additional technical insights and …
- FBI Issues Warning About ATM Malware Scam 2026-03-03 20:32 Government Technology (TNS) — The FBI is warning about a new type of crime that targets ATMs around the country. In a Feb. 19 alert,incidents the FBI said it has seen a sharp uptick in “ATM jackpotting,” a method that uses malware to force a cash machine to dispense money …
- Threat actors weaponize OAuth redirection logic to deliver malware 2026-03-03 18:16 Help Net Security An ongoing phishing campaign is abusing the OAuth authentication redirection mechanism to avoid triggering conventional email and browser defenses, Microsoft researchers have revealed. The attackers are targeting government and public-sector organizations …
- Zerobot Malware Exploits Tenda Command Injection Vulnerabilities to Deploy Malicious Payloads 2026-03-03 17:55 GBHackers An active Zerobot campaign abusing two critical vulnerabilities CVE-2025-7544 in Tenda AC1206 routers and CVE-2025-68613 in the n8n workflow automation platform to deploy a Mirai-based payload dubbed Zerobotv9. The campaign uses common download tools and …
- Zerobot Malware Exploiting Tenda Command Injection Vulnerabilities to Deploy Malware 2026-03-03 17:54 Cyber Security News A Mirai-based botnet campaign known as Zerobot has resurfaced with renewed force, this time targeting critical flaws in Tenda AC1206 routers and the n8n workflow automation platform. The campaign, now operating on its ninth known iteration — dubbed …
- Ransomware is now less about malware and more about impersonation 2026-03-03 14:00 Cybersecurity Dive Dive Brief: Identity has replaced malware as the biggest threat vector opening the door for ransomware attacks, Cloudflare said in an annual threat report published on Tuesday. Hackers’ increasing use of legitimate credentials, rather than malicious code, …
- SloppyLemming Targets Pakistan and Bangladesh Governments Using Dual Malware Chains 2026-03-03 11:10 The Hacker News Ravie LakshmananMar 03, 2026Malware / Phishing The threat activity cluster known as SloppyLemming has been attributed to a fresh set of attacks targeting government entities and critical infrastructure operators in Pakistan and Bangladesh. The …
- Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets 2026-03-03 11:10 The Hacker News Ravie LakshmananMar 03, 2026Phishing / Malware Microsoft on Monday warned of phishing campaigns that employ phishing emails and OAuth URL redirection mechanisms to bypass conventional phishing defenses implemented in email and browsers. The activity …
- DIY hackers are turning to ‘flat-pack’ malware components to speed up attacks and cut costs 2026-03-03 09:16 IT Pro Follow us Add us as a preferred source on Google Newsletter ITPro Get the IT Pro Newsletter Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ …
- Top 10 Malware of Q4 2025: A DNS Deep Dive 2026-03-03 04:18 Circle ID The Center for Internet Security (CIS) named the top 10 malware of Q4 2025 on 29 January 2026. They also identified network IoCs for seven of the top 10 malware—SocGholish, CoinMiner, Agent Tesla, Calendaromatic, ZPHP, VenomRAT, and ACR Stealer. Take a …
- Phish of the day: Microsoft OAuth scams abuse redirects for malware delivery 2026-03-03 01:52 The Register Microsoft has warned organizations about ongoing OAuth abuse scams that use phishing emails and URL redirects to infect victims' machines with malware and take over their devices. The phishing expedition targets government and public-sector …
- New 'Oblivion' RAT Malware Can Silently Hijack Your Android Phone 2026-03-02 19:19 Android Headlines The cybersecurity landscape for Android users recently hit a sophisticated new roadblock as a remote access trojan, appropriately named Oblivion, has begun circulating in the digital underground. Unlike the clumsy viruses of the past, this malware aims for …
- What Is ATM Jackpotting Scam? How Hackers Use Malware to Make ATMs Spit Out Cash 2026-03-02 16:40 Latestly New Delhi, March 2: The Federal Bureau of Investigation has issued a fresh warning about the growing threat of “ATM jackpotting,” a cybercrime that allows hackers to force cash machines to release money on command. In an alert released on February 19, the …
- Vibe coding service Lovable accused of hosting malware-ridden apps exposing thousands of users — it says they should take more care 2026-03-02 15:20 TechRadar Pro Follow us Add us as a preferred source on Google Newsletter Tech Radar Get the TechRadar Newsletter Sign up for breaking news, reviews, opinion, top tech deals, and more. You are now subscribed Your newsletter sign-up was successful Subscribe to our …
- CISA Alerts on RESURGE Malware Exploiting Ivanti Connect Secure Zero-Days 2026-03-02 12:17 GBHackers The Cybersecurity and Infrastructure Security Agency (CISA) has released a Malware Analysis Report (MAR) detailing a new malware family dubbed RESURGE, which is actively exploiting a zero-day vulnerability in Ivanti Connect Secure devices. According to …
- CISA Warns of RESURGE Malware Exploiting 0-Days to Breach Ivanti Connect Secure Devices 2026-03-02 12:17 Cyber Security News A newly discovered malware variant named RESURGE is actively targeting Ivanti Connect Secure devices by exploiting a critical zero-day vulnerability, prompting the U.S. Cybersecurity and Infrastructure Security Agency (CISA) to issue a formal warning. The …
- The rising shadow of python malware: A national call to digital vigilance 2026-03-01 11:47 Business Day There are moments in the evolution of a nation when a single incident, seemingly isolated, exposes a deeper and more troubling reality. The recent revelation of a sophisticated Python‑based malware uncovered during a fraud investigation is one such moment …
- Week in review: Self-spreading npm malware hits developers, Cisco SD-WAN 0-day exploited since 2023 2026-03-01 09:53 Help Net Security Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Identity verification systems are struggling with synthetic fraud Fake and expired IDs keep showing up in routine customer transactions, from alcohol …
- Windows WebDAV flaw fuels stealth malware spread 2026-03-01 07:55 Arabian Post Threat actors are exploiting a legacy Windows feature to deliver remote access malware while sidestepping conventional browser safeguards and some endpoint monitoring tools, according to new findings from cybersecurity researchers. Investigators at Cofense …
- I smell a RAT — new Android malware can hack every top phone maker's security, and costs less than a second-hand iPhone 2026-02-28 21:00 TechRadar Follow us Add us as a preferred source on Google Newsletter Tech Radar Get the TechRadar Newsletter Sign up for breaking news, reviews, opinion, top tech deals, and more. You are now subscribed Your newsletter sign-up was successful Subscribe to our …
- Hackers Exploit Windows File Explorer and WebDAV to Distribute Malware 2026-02-28 11:24 GBHackers Cybersecurity researchers at Cofense Intelligence have uncovered an ongoing campaign where threat actors abuse Windows File Explorer to distribute malware. By exploiting the legacy WebDAV protocol, attackers are tricking victims into downloading Remote …
- Hackers Abuse Windows File Explorer and WebDAV for Stealthy Malware Delivery 2026-02-28 11:23 Cyber Security News Cybercriminals are increasingly abusing a legacy feature within Windows File Explorer to distribute malware, bypassing traditional web browser security and endpoint detection controls. According to a threat report by Kahng An of the Cofense Intelligence …
- ScarCruft Uses Zoho WorkDrive and USB Malware to Breach Air-Gapped Networks 2026-02-27 22:43 The Hacker News Ravie LakshmananFeb 27, 2026Malware / Surveillance The North Korean threat actor known as ScarCruft has been attributed to a fresh set of tools, including a backdoor that uses Zoho WorkDrive for command-and-control (C2) communications to fetch more …
- Ukrenergo warns of malware distribution disguised as outage schedules 2026-02-27 19:27 UNN The national energy company "Ukrenergo" has detected another wave of fraudulent activities aimed at stealing user data through emails. Attackers are sending messages with subjects like "Outage Schedule" or "Updated Restriction …
- New Dohdoor Malware Attacking Schools and Health Care Sectors in U.S. via Multi-Stage Attack Chain 2026-02-27 18:26 Cyber Security News A newly discovered malware campaign has been quietly targeting educational institutions and healthcare organizations across the United States since at least December 2025. The threat, tracked under the actor designation “UAT-10027,” deploys a previously …
- ‘Resurge’ malware can remain undetected on devices 2026-02-27 16:08 Cybersecurity Dive The Cybersecurity and Infrastructure Security Agency on Thursday warned that a malware variant previously used in attacks against Ivanti Connect Secure environments may remain undetected on systems. In March 2025, CISA issued an alert about the malware, …
- Never click on a dodgy link again! Free feature saves you from malware hiding in your Google search 2026-02-27 13:00 GB News The next time you Google something ...you might want to enable a clever security watchdog. Surfshark, which already ranked as one best VPN deals in 2026, just unleashed a free browser extension designed to preemptively flag links to dodgy websites within …
- US authorities punish sellers of malware and spyware 2026-02-27 12:27 CSO The US authorities have made it clear that they will have no truck with any individuals trying to by-pass regulations on trading cyberweapons with hostile powers. Selling sensitive cyber-exploit components to a Russian company landed Australian citizen …
- Dohdoor Malware Targets U.S. Schools and Healthcare with Multi-Stage Attack 2026-02-27 11:44 GBHackers A new backdoor dubbed Dohdoor is actively targeting schools and health care organizations in the United States through a stealthy multi-stage attack chain. UAT-10027 focuses on education and health care entities in the U.S., sectors that handle highly …
- North Korean APT37 Hackers Leverages Novel Malware to Infect Air‑Gapped Systems 2026-02-27 11:41 Cyber Security News North Korea-linked threat group APT37 has launched a sophisticated new campaign using a fresh set of custom malware tools specifically designed to reach computers that are not connected to the internet — a type of system long considered among the most …
- Malware attack: Internal state services temporarily unavailable on mobile devices 2026-02-27 07:15 RTL Today RTL Lëtzebuerg adapted for RTL Today Access to internal state services via smartphones and tablets has been cut off after the discovery of malware on devices managed by the Government IT Centre. State services have been rendered inaccessible on mobile …
- Varist Hybrid Detection Engine protects against AI-assisted malware 2026-02-27 07:12 Help Net Security Varist launched the Hybrid Detection Engine, creating an AI-scale malware detection solution that detects both known and zero-day threats. Built on proven technology used to perform more than 500 billion file scans per day for global customers, the Varist …
- DOJ charges two alleged Tren de Aragua members in Massachusetts ATM malware case 2026-02-27 06:32 Just the News The Justice Department said Thursday that it has charged two more alleged Tren de Aragua members in connection with an ATM malware conspiracy that spans multiple states. The two 29-year-olds, Moises Alejandro Martinez Gutierrz and Lestter Guerrero, have …
- North Korean APT37 Unleashes Novel Malware to Target Air-Gapped Systems 2026-02-27 06:11 GBHackers North Korean threat group APT37 is using a new multi‑stage toolset to jump air‑gaps and conduct deep surveillance by abusing removable media, Ruby, and cloud services in a campaign Zscaler ThreatLabz tracks as “Ruby Jumper.” The campaign’s main goal is to …
- Inside the mind of a malware hunter 2026-02-26 23:24 Financial Post Malware Village was created to solve a clear problem. People entering the field needed accessible, hands-on education that removed barriers and provided real experience working with malicious code. Lim’s mission is simple. Equip learners with the skills, …
- Microsoft Warns Developers of Fake Next.js Job Repos Delivering In-Memory Malware 2026-02-26 19:39 The Hacker News A "coordinated developer-targeting campaign" is using malicious repositories disguised as legitimate Next.js projects and technical assessments to trick victims into executing them and establish persistent access to compromised machines. …
- ResidentBat Android Malware Grants Belarusian KGB Ongoing Mobile Access 2026-02-26 17:39 GBHackers ResidentBat is a custom Android spyware implant used by the Belarusian KGB to turn seized smartphones into long‑lived surveillance platforms against journalists and civil society targets. Operating outside the Play Store ecosystem and requiring hands‑on …
- ResidentBat Android Malware Provides Belarusian KGB with Persistent Access to Mobile Devices 2026-02-26 17:36 Cyber Security News A newly documented Android spyware called ResidentBat has been linked to the Belarusian KGB, giving state operators deep and persistent access to the mobile devices of journalists and civil society members. First publicly reported in December 2025 through …
- Inside Google’s Takedown of UNC2814: How the GridTide Malware Campaign Targeted Critical Infrastructure for Years 2026-02-26 15:28 WebProNews Google’s Threat Intelligence Group has publicly disclosed one of its most significant disruption operations in recent memory, dismantling a sophisticated cyber-espionage campaign attributed to a threat actor designated UNC2814. The group, which operated …