Cloud Security Docker Users Targeted with Crypto Malware Via Misconfigured APIs by CybrGPT August 24, 2025 by CybrGPT August 24, 2025
Security APT36 hackers abuse Linux .desktop files to install malware in new attacks by CybrGPT August 23, 2025 by CybrGPT August 23, 2025
Malware Fake Browser Updates Used in Malware Distribution by CybrGPT August 22, 2025 by CybrGPT August 22, 2025
Security “Rapper Bot” malware seized, alleged developer identified and charged by CybrGPT August 21, 2025 by CybrGPT August 21, 2025
Ransomware Noodlophile Malware Campaign Expands Global Reach with Copyright Phishing Lures by CybrGPT August 20, 2025 by CybrGPT August 20, 2025
Ransomware Apache ActiveMQ Flaw Exploited to Deploy DripDropper Malware on Cloud Linux Systems by CybrGPT August 20, 2025 by CybrGPT August 20, 2025
Ransomware Microsoft Windows Vulnerability Exploited to Deploy PipeMagic RansomExx Malware by CybrGPT August 20, 2025 by CybrGPT August 20, 2025
Security XenoRAT malware campaign hits multiple embassies in South Korea by CybrGPT August 19, 2025 by CybrGPT August 19, 2025
Security ERMAC Android malware source code leak exposes banking trojan infrastructure by CybrGPT August 18, 2025 by CybrGPT August 18, 2025
Malware USB Malware Campaign Spreads Cryptominer Worldwide by CybrGPT August 18, 2025 by CybrGPT August 18, 2025