WhatsApp Malware ‘Maverick’ Hijacks Browser Sessions to Target Brazil’s Biggest Banks

Threat hunters have uncovered similarities between a banking malware called Coyote and a newly disclosed malicious program dubbed Maverick that has been propagated via WhatsApp. According to a report from CyberProof, both malware strains are written in .NET, target Brazilian users and banks, and feature identical functionality to decrypt, targeting banking URLs and monitor banking […]

Continue Reading

GootLoader Is Back, Using a New Font Trick to Hide Malware on WordPress Sites

Nov 11, 2025Ravie LakshmananMalware / Network Security The malware known as GootLoader has resurfaced yet again after a brief spike in activity earlier this March, according to new findings from Huntress. The cybersecurity company said it observed three GootLoader infections since October 27, 2025, out of which two resulted in hands-on keyboard intrusions with domain […]

Continue Reading

AI spending is not all equal. Wall Street rewards hyperscalers, punishes DoorDash and Duolingo

Duolingo, Doordash and Roblox apps Tiffany Heard-Grear | Bloomberg | Getty Images Across the tech sector this earnings season, companies told Wall Street to get ready for ramped up spending as the artificial intelligence boom accelerates. But while investors largely rewarded the megacaps for their boosted capital expenditure forecasts, or just shrugged off their guidance, […]

Continue Reading

CISO’s Expert Guide To AI Supply Chain Attacks

AI-enabled supply chain attacks jumped 156% last year. Discover why traditional defenses are failing and what CISOs must do now to protect their organizations. Download the full CISO’s expert guide to AI Supply chain attacks here. TL;DR AI-enabled supply chain attacks are exploding in scale and sophistication – Malicious package uploads to open-source repositories jumped […]

Continue Reading

Researchers Detect Malicious npm Package Targeting GitHub-Owned Repositories

Nov 11, 2025Ravie LakshmananSoftware Supply Chain / Malware Cybersecurity researchers have discovered a malicious npm package named “@acitons/artifact” that typosquats the legitimate “@actions/artifact” package with the intent to target GitHub-owned repositories. “We think the intent was to have this script execute during a build of a GitHub-owned repository, exfiltrate the tokens available to the build […]

Continue Reading

Android Trojan ‘Fantasy Hub’ Malware Service Turns Telegram Into a Hub for Hackers

Cybersecurity researchers have disclosed details of a new Android remote access trojan (RAT) called Fantasy Hub that’s sold on Russian-speaking Telegram channels under a Malware-as-a-Service (MaaS) model. According to its seller, the malware enables device control and espionage, allowing threat actors to collect SMS messages, contacts, call logs, images, and videos, as well as intercept, […]

Continue Reading

Microsoft Discovers Vulnerability That Lets Hackers See ChatGPT and Gemini’s Conversation Topics

Microsoft has discovered a new vulnerability, called Whisper Leak, that reportedly affects most server-based AI chatbots, including ChatGPT and Gemini. The flaw enables attackers to infer conversation topics through side-channel attacks by analysing encrypted network traffic metadata. Microsoft says it worked with vendors like OpenAI, Mistral, and xAI to deploy mitiga…

Continue Reading

Oppo, OnePlus Start Global Android 16 Rollout with ColorOS 16 and OxygenOS 16 Updates

Oppo and OnePlus are expanding their Android 16 rollouts globally, bringing major upgrades to flagship phones and tablets. Oppo’s ColorOS 16, now reaching devices like the Find X8, Find N5, and Find N3 series, introduces smoother animations, improved performance, and enhanced AI tools, including Gemini Live integration. OnePlus’s OxygenOS 16 update, rolling out to…

Continue Reading