CyberSecurityNews

Moltbot Operators Leak Credentials via Exposed mDNS

Moltbot Operators Leak Credentials via Exposed mDNS

Moltbot, the open-source framework for distributed automation and agent orchestration hosted at github.com/openclaw, has gained traction for building autonomous systems. But a scan of public networks shows operators routinely exposing sensitive details through misconfigured multicast DNS (mDNS) announcements. These leaks reveal hostnames, ports, paths, and even credentials from messaging apps, often leading straight to accessible control […]

Moltbot Operators Leak Credentials via Exposed mDNS Read More »

TAMECAT Backdoor Steals Edge and Chrome Credentials

TAMECAT Backdoor Steals Edge and Chrome Credentials

Iranian hackers from APT42 are ramping up their SpearSpecter espionage campaign, deploying the TAMECAT PowerShell backdoor to steal browser credential and sensitive data from high profile targets. Recent analysis from Israel’s National Digital Agency reveals how this modular malware evades detection while targeting defense officials through sophisticated social engineering. Campaign Overview APT42, tied to Iran’s

TAMECAT Backdoor Steals Edge and Chrome Credentials Read More »

Education-Themed Malicious Domains Exposed as Part of Bulletproof Hosting Network

Education-Themed Malicious Domains Exposed as Part of Bulletproof Hosting Network

Cybersecurity researchers recently dug into a sneaky operation in which fake educational websites lure unsuspecting visitors into phishing traps or malware. It all started when someone spotted a suspicious JavaScript file at toxicsnake-wifes.com/promise/script.js. What looked like a single bad site turned out to be part of a larger network, a bunch of throwaway domains hosted

Education-Themed Malicious Domains Exposed as Part of Bulletproof Hosting Network Read More »

Attackers Abuse Hugging Face to Host Android RAT Payloads

Attackers Abuse Hugging Face to Host Android RAT Payloads

A sophisticated Android remote access trojan (RAT) campaign that leverages social engineering, Hugging Face’s infrastructure for payload staging, and heavy abuse of Android Accessibility Services to gain deep control over infected devices. What stands out is how attackers exploit Hugging Face, a popular platform for machine learning models, datasets, and developer tools, to host and

Attackers Abuse Hugging Face to Host Android RAT Payloads Read More »

Hackers Weaponize Open VSX Extension With Sophisticated Malware After 5,066 Downloads

Hackers Weaponize Open VSX Extension With Sophisticated Malware After 5,066 Downloads

Developers reaching for familiar tools in open-source marketplaces might be inadvertently handing over their credentials. Researchers recently uncovered a malicious VS Code extension on Open VSX, disguised as the popular Angular Language Service. Published just two weeks ago, it racked up 5,066 downloads before activating its payload. This isn’t a simple Trojan; it’s a multi-stage

Hackers Weaponize Open VSX Extension With Sophisticated Malware After 5,066 Downloads Read More »

Threat Actors Abuse Google Ads to Push Fake Mac Cleaners

Threat Actors Abuse Google Ads to Push Fake Mac Cleaners

Imagine searching Google for “mac cleaner” or “clear cache macOS,” clicking a shiny sponsored ad, and without writing handing over your Mac keys to attacker. Cybersecurity researchers have uncovered a fresh campaign abusing Google Ads to redirect users to malicious pages that mimick Apple’s site. These Mac owners with promise of simple storage fixes, only

Threat Actors Abuse Google Ads to Push Fake Mac Cleaners Read More »

Open Directory Leak Exposes BYOB Framework Across OSes

Open Directory Leak Exposes BYOB Framework Across OSes

Threat hunters recently uncovered an exposed directory on a live command-and-control (C2) server hosting a complete Build Your Own Botnet (BYOB) framework deployment. The server at IP 38.255.43.60:8081, hosted by Hyonix in the US, was serving droppers, stagers, payloads, and post-exploitation modules for cross-platform attack. This modular Python-based RAT targets Windows, Linux, and macOS, with

Open Directory Leak Exposes BYOB Framework Across OSes Read More »

Malicious Outlook Add-ins Used to Steal Emails Silently

Malicious Outlook Add-ins Used to Steal Emails Silently

Malicious Outlook Add-ins Used to Steal Emails In a finding that exposes a hidden gap in Microsoft 365 monitoring, Varonis Threat Labs has uncovered how attackers can quietly abuse Outlook add-ins to extract sensitive email data from organizations. They call this technique “Exfil Out&Look.” These add-ins are meant to boost productivity by integrating web applications

Malicious Outlook Add-ins Used to Steal Emails Silently Read More »

Cal.com’s Access Control Mess: How It Let Attackers Hijack Accounts and Dump Millions of Bookings

Cal.com’s Access Control Mess: How It Let Attackers Hijack Accounts and Dump Millions of Bookings

Cal.com’s Access Control Mess Researchers just dug into Cal.com Cloud, that open source scheduling tool folks use as a Calendly alternative with calendar syncs, team features, and APIs. What they found were some nasty, interlinked access control issues that let anyone fully take over user accounts or snoop on every booking, including private meeting details

Cal.com’s Access Control Mess: How It Let Attackers Hijack Accounts and Dump Millions of Bookings Read More »

Generative Application Firewall

Generative Application Firewall: The Missing Shield for AI Chat Apps

Generative Application Firewall Generative AI is everywhere these days, powering chatbots, code helpers, and content generators in apps we use daily. This feels like the early days of web apps, when hackers found ways to slip past basic network defenses. Back then, we got Web Application Firewalls (WAFs) to plug the gaps. Now, a new

Generative Application Firewall: The Missing Shield for AI Chat Apps Read More »