In the lead up to Valentine’s Day, dating apps get busier – and so do scammers.
Maria Korneeva/Getty Images
Romance scams are among the most emotionally damaging forms of cyber crime because they combine carefully manufactured intimacy with financial theft – the scammers go aft… [+5235 chars]
The Mandiant security team says North Korean hackers are upgrading their social engineering tactics to include AI-generated video.
In brief
<ul><li>North Korean actors are targeting the crypto industry with phishing attacks using AI deepfakes and fake Zoom meetings, Google warned.</li><li>More than $2 billion in crypto was stol… [+5421 chars]
ZeroDayRAT is a commercial mobile spyware that grants full remote access to Android and iOS devices for spying and data theft. ZeroDayRAT is a newly discovered commercial mobile spyware toolkit that gives attackers full control over Android and iOS devices. I…
ZeroDayRAT spyware grants attackers total access to mobile devices
ZeroDayRAT is a newly discovered commercial mobile spyware toolkit that gives attackers full control over Android and iOS devices. … [+3478 chars]
ZeroDayRAT is a new mobile spyware targeting Android and iOS, offering attackers persistent access
A new mobile spyware operation known as ZeroDayRAT has been documented targeting both Android and iOS devices.
The cross-platform tool provides attackers with persistent access to personal communica… [+3082 chars]
ZeroDayRAT is a new spyware sold on Telegram that targets Android and iOS devices with live surveillance, keylogging, and financial theft.
Weve said this time and time again, but you have to be vigilant about links sent by unknown senders, suspicious email attachments, and downloading apps outside of authorized app stores. According to … [+2417 chars]
A new commercial mobile spyware platform dubbed ZeroDayRAT is being advertised to cybercriminals on Telegram as a tool that provides full remote control over compromised Android and iOS devices. [...]
A new commercial mobile spyware platform dubbed ZeroDayRAT is being advertised to cybercriminals on Telegram as a tool that provides full remote control over compromised Android and iOS devices.
The… [+2917 chars]
Microsoft warns info-stealing attacks are expanding from Windows to macOS, using cross-platform languages like Python and abusing trusted platforms. Microsoft warns info-stealing attacks are rapidly expanding from Windows to macOS, using cross-platform langua…
Microsoft: Info-Stealing malware expands from Windows to macOS
Microsoft warns info-stealing attacks are rapidly expanding from Windows to macOS, using cross-platform languages like Python and abusi… [+5179 chars]
None
Posted by Nataliya Stanetsky, Fabricio Ferracioli, Elliot Sisteron, Irene Ang of the Android Security Team
Phone theft is more than just losing a device; it's a form of financial fraud that can lea… [+3500 chars]
High Vulnerabilities
<table>
<tr>
<th>PrimaryVendor -- Product</th>
<th>Description</th>
<th>Published</th>
<th>CVSS Score</th>
<th>Source Info</th>
<th>Patch Info</th>
</tr>
<tr>
<td>Agatasoft--AgataSoft PingMaster Pro</td>
<td>AgataSoft PingMaster Pr…
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded in the past week. In some cases, the vulnerabilities in the bulletin may not yet have assigned CVSS s… [+899 chars]
As many as 3,136 individual IP addresses linked to likely targets of the Contagious Interview activity have been identified, with the campaign claiming 20 potential victim organizations spanning artificial intelligence (AI), cryptocurrency, financial services…
As many as 3,136 individual IP addresses linked to likely targets of the Contagious Interview activity have been identified, with the campaign claiming 20 potential victim organizations spanning arti… [+4070 chars]
In cybersecurity, the line between a normal update and a serious incident keeps getting thinner. Systems that once felt reliable are now under pressure from constant change. New AI tools, connected devices, and automated systems quietly create more ways in, o…
In cybersecurity, the line between a normal update and a serious incident keeps getting thinner. Systems that once felt reliable are now under pressure from constant change. New AI tools, connected d… [+24771 chars]
Microsoft’s investigation into RedVDS services and infrastructure uncovered a global network of disparate cybercriminals purchasing and using to target multiple sectors. In collaboration with law enforcement agencies worldwide, Microsoft’s Digital Crimes Unit…
Over the past year, Microsoft Threat Intelligence observed the proliferation of RedVDS, a virtual dedicated server (VDS) provider used by multiple financially motivated threat actors to commit busine… [+28173 chars]
NEW HAVEN, Conn. (WTNH) — New Haven Police Chief Karl Jacobson admitted theft and misuse of public funds, Mayor Justin Elicker announced during a press conference Monday. Jacobson allegedly admitted to taking money from a city fund used for confidential infor…
Skip to comments.
New Haven police chief admits to theft, misuse of fundsWTNH.com ^
| Ronin Himelrick
Posted on 01/06/2026 7:46:40 AM PST by Puppage
NEW HAVEN, Conn. (WTNH) New Haven Police Chie… [+1661 chars]
North Korea’s Lazarus Group deploys a new BeaverTail variant to steal credentials and crypto using fake job lures, dev tools, and smart contracts.
On Thursday, December 18, 2025, cybersecurity firm Darktrace released new research regarding a dangerous new variant of BeaverTail malware, a JavaScript-based information stealer.
Linked to North K… [+3392 chars]
A new variant of the BeaverTail malware linked to North Korean hackers has been identified targeting cryptocurrency traders and developers
A newly observed variant of the BeaverTail malware has been tied to hackers associated with North Korea.
The findings come from Darktrace’s latest The State of Cybersecurity report, which links Beav… [+3097 chars]
SimpleX Chat’s X account hacked to promote fake crypto site urging users to connect wallets. Site mimicked official design to steal funds.
SimpleX Chat, a privacy-first messaging platform known for avoiding user identifiers and emphasising metadata protection, confirmed that its official X (formerly Twitter) account was compromised in a… [+4047 chars]
The U.S. is probing how Chinese operators used AI in a cyber-espionage campaign as experts warn similar tools could hit on-chain finance.
In brief
<ul><li>U.S. committees are reportedly seeking details on how Anthropics Claude Code was used in a state-linked cyberattack.</li><li>Anthropic disclosed earlier this month that the threat g… [+3901 chars]
Threat actors expanded operations using malicious apps, outdated devices, and IoT exploits while global attack volumes surged across key regions.
<ul><li>Android malware downloads reached alarming levels, with millions exposed through trusted apps</li><li>Attackers shifted aggressively toward mobile payments using social-engineering</li><li>En… [+3948 chars]
Blue shield logo with a white letter G, centered above the white text "Online Scams Advisory #3" on a dark blue background.
1. Online job scams
Online job scams, where fraudsters impersonate legitimate job-seeking platforms to target vulnerable job seekers, are rising.
These campaigns involve impersonating well-known co… [+1170 chars]
NordVPN data reveals cybercriminals built over 120,000 fake Amazon websites before Prime Day, driving a surge in online scams
<ul><li>Over 120,000 fake Amazon websites appeared before Prime Day sales</li><li>Unauthorized payment scams rose to 38%, showing hackers’ shifting focus</li><li>Shoppers’ excitement around Prime Day… [+3644 chars]
Cybersecurity researchers have disclosed details of a new Rust-based backdoor called ChaosBot that can allow operators to conduct reconnaissance and execute arbitrary commands on compromised hosts.
"Threat actors leveraged compromised credentials that mapped …
Cybersecurity researchers have disclosed details of a new Rust-based backdoor called ChaosBot that can allow operators to conduct reconnaissance and execute arbitrary commands on compromised hosts.
… [+4843 chars]
Many people install a free VPN app to protect their privacy or stream content quickly, but some of those free apps are malicious VPN apps in disguise. That’s
Click here to buy secure, speedy, and reliable Web hosting, Cloud hosting, Agency hosting, VPS hosting, Website builder, Business email, Reach email marketing at 20% discount from our Gold Partner Ho… [+9889 chars]
* Cisco Talos has confirmed that ransomware operators are leveraging Velociraptor, an open-source digital forensics and incident response (DFIR) tool that had not previously been definitively tied to ransomware incidents.
* We assess with moderate confiden…
<ul><li>Cisco Talos has confirmed that ransomware operators are leveraging Velociraptor
, an open-source digital forensics and incident response (DFIR) tool that had not previously been definitively… [+15646 chars]
FortiGuard Labs details Chaos-C++, a ransomware variant using destructive encryption and clipboard hijacking to amplify damage and theft. Read more.…
Affected Platforms: Microsoft WindowsImpacted Users: Microsoft WindowsImpact: Most files on the compromised machines are encryptedSeverity Level: High
In 2025, Chaosransomware resurfaced with a C++ … [+17679 chars]
North Korean hackers have stolen an estimated $2 billion worth of cryptocurrency assets in 2025, marking the largest annual total on record. [...]
North Korean hackers have stolen an estimated $2 billion worth of cryptocurrency assets in 2025, marking the largest annual total on record.
The figure brings the total confirmed amount stolen by th… [+2700 chars]