Workflow
Malware
icon
Search documents
China’s cyber forces are targeting every American #shorts
60 Minutes· 2025-10-13 01:48
Once inside, China did not install malware, which could be a red flag. Instead, it stole login credentials and masqueraded as a legitimate employee. They are just gaining access to that system and then attempting to lay dormant.They're not spending more time collecting intelligence or taking other activities. It's there if they need it later. Exactly.Do we even know how extensively the Chinese are into our systems. I I don't think we have a a a perfect knowledge of that. How many Chinese attacks are there o ...
X @Decrypt
Decrypt· 2025-10-11 19:35
The keylogging malware is capable of using GitHub to redirect itself to new servers whenever existing servers go offline. https://t.co/8zqRd3KlVt ...
X @Crypto Rover
Crypto Rover· 2025-10-06 08:49
RT DGRS Maxi (@Maxi_maximalist)In the age of AI, it'll be crucial to have a system that only remembers what you want it to. A system that generates proofs on demand. A system that blocks malware and data leakage.A system that's not just another app but a base layer: OS + Network.$NOX 👉 @nonossystems 🔐 https://t.co/2fbOfzPBFI ...
X @The Block
The Block· 2025-09-12 11:55
New ModStealer malware hunts crypto wallets with fake recruiter ads, evades antivirus detection https://t.co/8XdsIduQ9y ...
X @Decrypt
Decrypt· 2025-09-12 03:58
Researchers Uncover Undetectable Malware Draining Crypto Browser Wallets► https://t.co/cWAM51x0QC https://t.co/cWAM51x0QC ...
X @Cointelegraph
Cointelegraph· 2025-09-04 21:30
🚨 ALERT: Hackers are hiding malware in Ethereum smart contracts, disguising malicious traffic as normal blockchain activity, ReversingLabs reports. https://t.co/Bg1IyrZo7W ...
X @Decrypt
Decrypt· 2025-09-04 14:27
Hackers Using Ethereum Smart Contracts to Deliver Malware: Report► https://t.co/EMqOtvc4mR https://t.co/EMqOtvc4mR ...
X @BNB Chain
BNB Chain· 2025-09-04 11:32
Threat Landscape - DPRK threat actors are actively using fake Zoom links and Deepfakes to target macOS users in cryptocurrency scams [1] - These scams involve tricking users into installing malware to drain their crypto funds [1] - The crypto community needs to be well-informed to combat these persistent threats [1] Red Flags - Unexpected DMs on Telegram asking for meeting calls should raise suspicion [1] - Discrepancies in the account's behavior or Telegram handle are warning signs [1] - Be cautious of prompts to download security updates or fixes from forwarded "Zoom" links [1] - Inconsistencies in voice, visuals, or lighting during meeting calls are potential indicators of a scam [1] Security Recommendations - It's crucial to recognize that macOS is not inherently immune to malware attacks [1] - Individuals who suspect they have been targeted should seek assistance immediately [2]
X @Decrypt
Decrypt· 2025-08-18 19:50
Cybersecurity Threat - Fake Captcha prompts are being used to distribute fileless Lumma Stealer malware [1] - The Lumma Stealer malware targets and steals cryptocurrency wallet credentials [1]
X @Decrypt
Decrypt· 2025-08-18 17:48
Malware Distribution - Hackers are using fake Captchas to spread Lumma Stealer malware [1] Cybersecurity Threat - The industry should be aware of the increasing use of deceptive tactics, such as fake Captchas, to distribute malware [1]