Android.Backdoor.916.origin: New Sophisticated Mobile Malware Targets Russian Businesses

Man in a suit anxiously examines a smartphone displaying a security alert.

Cybersecurity researchers at Dr.Web have identified a sophisticated new mobile threat targeting Russian enterprises through an advanced Android backdoor designated as Android.Backdoor.916.origin. This Kotlin-based malware represents a significant escalation in mobile cyber threats, demonstrating advanced technical capabilities specifically designed for targeted attacks against domestic business networks. Threat Discovery and Evolution Timeline The malware samples first … Read more

US Government Secretly Tracks AI Chips with GPS Devices to Prevent China Export Violations

Smartphone displaying a location pin, American flag waving behind a microchip.

The United States government has implemented a covert surveillance program that involves embedding GPS tracking devices in artificial intelligence chip shipments to prevent their illegal diversion to China. This unprecedented measure represents a significant escalation in technology export controls, affecting products from major tech companies and establishing new precedents for monitoring critical technology transfers. Covert … Read more

ERMAC 3.0 Banking Trojan Source Code Leak Exposes Global Banking Infrastructure to Unprecedented Cyber Threats

Frantic programmer discovers source code leak on his laptop screen.

A critical security incident has emerged in the cybersecurity landscape as Hunt Intelligence researchers discovered a complete source code leak of the ERMAC 3.0 Android banking trojan. This sophisticated malware-as-a-service (MaaS) platform poses an unprecedented threat to global financial institutions and mobile banking users worldwide, potentially enabling widespread cybercriminal activities. ERMAC Banking Trojan Evolution and … Read more

MadeYouReset: Critical HTTP/2 Vulnerability Bypasses Standard DDoS Protections

Urban skyline with vibrant explosion of light near university building.

Cybersecurity researchers have discovered a critical vulnerability in HTTP/2 protocol implementations, dubbed MadeYouReset, that enables attackers to launch devastating distributed denial-of-service (DDoS) attacks capable of crippling web infrastructure. This sophisticated attack vector bypasses existing HTTP/2 security mechanisms, posing unprecedented risks to organizations worldwide. Understanding the CVE-2025-8671 Vulnerability Joint research conducted by Imperva, Deepness Lab, and … Read more

Magic Mouse Phishing Platform: New Cyberthreat Stealing 650,000 Card Details Monthly

Dark figure in a hooded jacket faces an ominous glowing mouse emblem in stormy scenery.

The cybercrime landscape continues evolving at an alarming pace. Following the successful shutdown of the notorious Darcula phishing platform and its associated Magic Cat software, security researchers have identified a dangerous new threat actor. The Magic Mouse platform has emerged as a sophisticated successor, presenting significant risks to global financial security according to recent findings … Read more

Russian Cybersecurity Landscape 2025: AI-Powered Threats and Advanced APT Groups Analysis

** Computer on left shows email interface; right features a shadowy figure and skull icon.

Russia’s cybersecurity environment is undergoing unprecedented transformation as Q2 2025 data reveals a dramatic escalation in cybercriminal activity. Advanced persistent threat (APT) groups are deploying increasingly sophisticated attack vectors, with artificial intelligence emerging as a game-changing tool for malware development. This evolution represents a fundamental shift in the threat landscape, requiring organizations to reassess their … Read more

US Treasury Sanctions Grinex Crypto Exchange as Garantex Successor Platform

Woman holding justice symbols as figure in shadows interacts with a computer screen.

The US Treasury’s Office of Foreign Assets Control (OFAC) has imposed comprehensive sanctions on the cryptocurrency exchange Grinex, identifying it as the direct successor to the previously sanctioned Garantex platform. This enforcement action represents a significant escalation in US authorities’ efforts to combat cryptocurrency-enabled money laundering and cybercrime financing operations. Establishing the Garantex-Grinex Connection Blockchain … Read more

Major Google Ads Data Breach Exposes 2.55 Million Customer Records Through Salesforce Attack

Businessman stressed while working on Google Ads at a desk.

Google has officially confirmed a significant cybersecurity incident that compromised sensitive customer information from its Google Ads advertising platform. The breach, orchestrated by the notorious hacking collective ShinyHunters in June 2025, targeted Salesforce CRM infrastructure and resulted in the exposure of approximately 2.55 million customer records containing personal data. Advanced Social Engineering: How Vishing Attacks … Read more

Critical xz Utils Backdoor Still Lurks in 35 Docker Hub Images – Supply Chain Security Alert

** Two contrasting whale logos representing different themes and moods.

Cybersecurity researchers at Binarly have uncovered a persistent threat in the containerization ecosystem: 35 Docker Hub images still contain the malicious backdoor that was embedded in the popular xz Utils package during 2024. This discovery highlights the enduring consequences of supply chain attacks and poses significant risks to modern DevOps workflows and production environments. Understanding … Read more

BadCam Attack Transforms Webcams into Remote BadUSB Attack Vectors

Urban skyline of Shanghai featuring Lenovo building and river view.

Cybersecurity researchers from Eclypsium have unveiled a groundbreaking attack vector called BadCam at DEF CON 33, demonstrating how threat actors can remotely compromise webcams and transform them into covert BadUSB attack platforms. This innovative technique represents a significant evolution in cyber threats, eliminating the need for physical device access while maintaining persistent malicious capabilities. Understanding … Read more