by Syndicated News Feed | Dec 16, 2025 | IT Security |
Chinese espionage crew Ink Dragon has expanded its snooping activities into European government networks, using compromised servers to create illicit relay nodes for future operations. The campaign has hit “several dozen victims,” Check Point Software...
by Syndicated News Feed | Dec 16, 2025 | IT Security |
A new Android malware-as-a-service (MaaS) named Cellik is being advertised on underground cybercrime forums offering a robust set of capabilities that include the option to embed it in any app available on the Google Play Store. Specifically, attackers can select apps...
by Syndicated News Feed | Dec 16, 2025 | IT Security |
A new campaign dubbed ‘GhostPoster’ is hiding JavaScript code in the image logo of malicious Firefox extensions with more than 50,000 downloads, to monitor browser activity and plant a backdoor. The malicious code grants operators persistent high-privilege...
by Syndicated News Feed | Dec 16, 2025 | IT Security |
A new, modular infostealer called SantaStealer, advertised on Telegram with a basic tier priced at $175 per month, promises to make criminals’ Christmas dreams come true. It boasts that it can run “fully undetected” even on systems with the...
by Syndicated News Feed | Dec 16, 2025 | IT Security
Petróleos de Venezuela (PDVSA), Venezuela’s state-owned oil company, was hit by a cyberattack over the weekend that disrupted its export operations. In a Monday statement, PDVSA denied that the Saturday morning incident affected its operations in any way, adding...
by Syndicated News Feed | Dec 16, 2025 | IT Security
A view of the H2 2025 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts 16 Dec 2025 • , 2 min. read The second half of the year underscored just how quickly attackers adapt and innovate, with rapid...