ClayRat Android Spyware Targets Russian Users with Telegram Channels and Fake Play Pages

Man looks concerned as he holds a phone displaying a spyware installation screen.

Security researchers have documented a large-scale Android espionage operation in Russia that uses convincing social engineering, Telegram distribution, and a modern installation trick to weaken Android’s defenses. The malware, dubbed ClayRat, impersonates legitimate apps such as WhatsApp, Google Photos, TikTok, and YouTube, and is delivered via phishing sites and Telegram channels. Once installed, it can … Read more

Qualcomm to Acquire Arduino: Implications for IoT, Edge AI, and Cybersecurity

Arduino board on the left, Qualcomm Snapdragon logo on the right against a dark background.

Qualcomm announced its intent to acquire Arduino, the open-source hardware and software ecosystem used by millions of developers worldwide. The companies state that the Arduino brand, mission, and open development model will be preserved, and that the ecosystem will remain multi-vendor. Financial terms were not disclosed, and closing is subject to regulatory approvals and customary … Read more

North Korean Crypto Theft Hits Record $2B in 2025: Elliptic Analysis and Security Guidance

Hooded figure using a laptop with a Bitcoin logo, flanked by flames and a missile.

Blockchain analytics firm Elliptic estimates that North Korea–linked threat actors stole more than $2 billion in cryptocurrency during the first nine months of 2025—an all-time high. Cumulative, confirmed losses attributed to DPRK operators have now surpassed $6 billion. As noted in multiple United Nations and U.S. government reports, proceeds from these operations are believed to … Read more

Salesforce Rejects Ransom Demands as Scattered Lapsus$ Hunters Threaten Mass Data Leak via OAuth Exploits

Dark surreal scene with a chained cloud and a skull backdrop, evoking tension.

Salesforce has notified customers it will not negotiate or pay ransom to the threat actors behind a wave of data exfiltration from customer-run Salesforce instances. According to Bloomberg, the extortion group has warned of imminent data releases and published a list of 39 globally recognized organizations it claims are affected. Salesforce refuses ransom: timeline and … Read more

WireTap Attack Breaks Intel SGX DCAP Attestation with a Passive DDR4 Interposer

Hand installing RAM modules into a computer's motherboard, showcasing technology.

Researchers from the Georgia Institute of Technology and Purdue University have introduced WireTap, a physical-layer attack that compromises Intel Software Guard Extensions (SGX) by undermining the Data Center Attestation Primitives (DCAP) mechanism. By placing a passive interposer between the memory controller and a DDR4 DIMM, the team extracted the platform attestation key and generated valid … Read more

Solar 4RAYS identifies new East Asian cluster NGC4141 exploiting API logic to compromise federal web app

Man working at a futuristic desk, analyzing data on a large screen.

Solar 4RAYS has profiled a previously unidentified East Asian threat cluster, designated NGC4141, after the group compromised a federal agency’s custom web application. Investigators say the operators abused undocumented API capabilities to achieve operating system–level command execution, deploy web shells, and pivot into the internal network before access was contained. Attack timeline: from high‑volume scanning … Read more

SORVEPOTEL Malware Abuses WhatsApp Web to Self‑Spread in Brazil

Scenic view of Brasil with mountains, bay, and a capybara near a signpost.

Trend Micro has identified a rapid‑propagation Windows threat dubbed SORVEPOTEL that weaponizes WhatsApp Web to distribute itself at scale. The campaign is overwhelmingly concentrated in Brazil and emphasizes speed and reach over data theft or extortion, underscoring how mainstream messaging platforms can be turned into efficient malware delivery rails with minimal user interaction. SORVEPOTEL scope, … Read more

Discord disputes massive breach claim tied to outsourced support provider

Aerial view of a city skyline with "RANSOMWARE" text and Discord building.

Discord has publicly refused to pay a ransom to cybercriminals who claim they stole data on 5.5 million users. The company maintains the exposure is far smaller—about 70,000 users—and stems from a third‑party customer support vendor whose account was compromised on September 20, 2025. Official statement: vendor compromise and preliminary impact Discord says the incident … Read more

Mic‑E‑Mouse: Optical Mice Abused as “Microphones” in New Acoustic Side‑Channel Attack

Aerial view of a university campus with modern buildings and green spaces.

Researchers at the University of California, Irvine have demonstrated Mic‑E‑Mouse, a novel acoustic side‑channel attack that repurposes modern high‑DPI optical mice as improvised “microphones.” By harvesting standard HID motion telemetry, the method captures tiny surface vibrations induced by human speech and reconstructs an intelligible audio signal—without accessing the system microphone. How the Mic‑E‑Mouse acoustic side‑channel … Read more