Latest news

A Sneaky New Threat: Microsoft Teams Calls and QuickAssist Lead to Stealthy Malware Attacks
Phishing

A Sneaky New Threat: Microsoft Teams Calls and QuickAssist Lead to Stealthy Malware Attacks

9 December 2025 dark6

From phishing calls to fileless malware, the evolution of cyberattacks is alarmingly rapid. The latest threat employs a sophisticated blend...
A Sophisticated New Threat: FvncBot Strikes Again
Malware

A Sophisticated New Threat: FvncBot Strikes Again

7 December 2025 dark6

A dangerous new banking malware called FvncBot is targeting unsuspecting users of Android devices, leveraging sophisticated techniques to steal sensitive...
The Sophisticated ClickFix Sting: How Calisto Disguises Itself to Steal Credentials
Spyware

The Sophisticated ClickFix Sting: How Calisto Disguises Itself to Steal Credentials

5 December 2025 dark6

Calisto, a cyberespionage campaign attributed to the Russian FSB’s Center 18 for Information Security (military unit 64829), has been making...
ClayRat: A New Breed of Android Spyware with Unprecedented Control
Malware

ClayRat: A New Breed of Android Spyware with Unprecedented Control

5 December 2025 dark6

A closer look at the sophisticated threat and its tactics. The mobile device landscape is under a constant barrage of...
K.G.B. RAT Strikes Again: A Case Study in Undetectable Malware Distribution
Cybercrime

K.G.B. RAT Strikes Again: A Case Study in Undetectable Malware Distribution

3 December 2025 dark6

The underground cybercriminal ecosystem has witnessed a worrisome development – the rise of a highly sophisticated remote access trojan (RAT)...
Pakistan-based APT36 Leverages Python and Linux for Sophisticated Indian Government Espionage
Malware

Pakistan-based APT36 Leverages Python and Linux for Sophisticated Indian Government Espionage

1 December 2025 dark6

A new wave of cyberespionage has emerged, targeting the critical infrastructure of Indian government institutions. This time, it’s not your...
How Hackers are using Open-Source repositories to steal crypto
Malware

How Hackers are using Open-Source repositories to steal crypto

24 November 2025 dark6

A new wave of malware targeting cryptocurrency users is hitting developers hard, showcasing the growing sophistication and accessibility of attacks...
APT24: three years of obscure espionage with the “BadAudio” download
Malware

APT24: three years of obscure espionage with the “BadAudio” download

21 November 2025 dark6

For years, APT24, a sophisticated cyber espionage group linked to China’s People’s Republic, has been quietly crafting targeted attacks against...
Nova Stealer: macOS cryptocurrency theft
Malware

Nova Stealer: macOS cryptocurrency theft

19 November 2025 dark6

The cybersecurity landscape is consistently shaped by increasingly sophisticated threats, and the latest to garner significant attention is Nova Stealer...
SpearSpecter: Iran’s Patient, multi-layered targeting campaign
Spyware

SpearSpecter: Iran’s Patient, multi-layered targeting campaign

17 November 2025 dark6

The cybersecurity landscape is increasingly characterized by sophistication, and the ongoing SpearSpecter campaign represents a particularly concerning evolution in state-sponsored...
Texas governor bans DeepSeek and RedNote on government devices
Privacy

Texas governor bans DeepSeek and RedNote on government devices

1 February 2025 securebulletin.com

In a significant move reflecting heightened cybersecurity concerns, Texas Governor Greg Abbott has issued an order banning the use of...
Fake wedding invitations to spread Android Malware in Southeast Asia
Malware

Fake wedding invitations to spread Android Malware in Southeast Asia

1 February 2025 securebulletin.com

Since mid-2024, a new malware campaign targeting Android users has emerged, identified as the Tria stealer. This malware exploits wedding...