monerai.org - urlscan.io

urlscan.io - Website scanner for suspicious and malicious URLs

A #WhatsApp bug lets #malicious media files spread through group chats

Google’s Project Zero has just disclosed a WhatsApp vulnerability where a malicious media file, sent into a newly created group chat, can be automatically downloaded and used as an attack vector. #malware

https://www.malwarebytes.com/blog/news/2026/01/a-whatsapp-bug-lets-malicious-media-files-spread-through-group-chats

A WhatsApp bug lets malicious media files spread through group chats

Google’s Project Zero team found that WhatsApp can download a malicious media file without you doing anything at all.

Malwarebytes

📢🗒️⚠️ A months-long breach allowed Chinese state-sponsored hackers to hijack Notepad++ updates and push malware via a compromised hosting provider.

Read: https://hackread.com/notepad-updates-malware-hosting-breach/

#China #CyberSecurity #NotePad++ #DataBreach #Malware

Notepad++ Updates Delivered Malware After Hosting Provider Breach

Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread

📰 Warning: Malicious ChatGPT Chrome Extensions Steal Session Tokens to Hijack Accounts

⚠️ 16 malicious Chrome extensions found targeting ChatGPT users. They inject scripts to steal session tokens and hijack accounts. Review your browser extensions now! #ChatGPT #Chrome #Malware #Privacy

🔗 https://cyber.netsecops.io/articles/malicious-chatgpt-chrome-extensions-hijack-user-sessions/?utm_source=mastodon&utm_medium=social&utm_campaign=twitter_auto

Warning: Malicious ChatGPT Chrome Extensions Steal Session Tokens to Hijack Accounts

Researchers have identified 16 malicious Google Chrome extensions that masquerade as ChatGPT tools to inject scripts, steal session tokens, and hijack user accounts.

CyberNetSec.io

📰 New "Pulsar RAT" Evades Detection with In-Memory Execution and LoTL Techniques

🔎 New stealthy 'Pulsar RAT' discovered targeting Windows. The .NET malware uses in-memory execution, LoTL techniques, and exfiltrates data via Discord/Telegram to evade detection. #Malware #RAT #ThreatIntel #Windows

🔗 https://cyber.netsecops.io/articles/new-pulsar-rat-windows-malware-uses-in-memory-execution/?utm_source=mastodon&utm_medium=social&utm_campaign=twitter_auto

New "Pulsar RAT" Evades Detection with In-Memory Execution and LoTL Techniques

Analysis of the new Pulsar RAT, a modular .NET-based remote access trojan for Windows that uses in-memory execution, anti-analysis techniques, and legitimate web services for C2.

CyberNetSec.io

📰 Open VSX Marketplace Hit by Supply Chain Attack Spreading "GlassWorm" Malware

📢 Open VSX Registry hit by supply chain attack! A compromised developer account was used to inject GlassWorm malware into 4 popular VS Code extensions, affecting 22k+ downloads. #OpenVSX #SupplyChain #Malware #GlassWorm

🔗 https://cyber.netsecops.io/articles/open-vsx-marketplace-compromised-to-spread-glassworm-malware/?utm_source=mastodon&utm_medium=social&utm_campaign=twitter_auto

Open VSX Marketplace Hit by Supply Chain Attack Spreading "GlassWorm" Malware

A supply chain attack on the Open VSX Registry where a compromised developer account was used to publish malicious versions of four extensions, distributing the GlassWorm malware loader.

CyberNetSec.io

Boost your skills with today’s cybersecurity playlist: exploits, defenses, and real-world lessons. 🔒 https://www.youtube.com/playlist?list=PLXqx05yil_mcHQf-l36zF7Vyny-Trt8nF

#CyberAwareness #NetworkSecurity #ZeroTrust #ThreatIntelligence #Malware

260202 rootshell.online

YouTube
Security Week: Cyber Insights 2026: Malware and Cyberattacks in the Age of AI https://www.securityweek.com/cyber-insights-2026-malware-and-cyberattacks-in-the-age-of-ai/ @SecurityWeek #infosec #malware
Cyber Insights 2026: Malware and Cyberattacks in the Age of AI

How AI and agentic AI are reshaping malware and malicious attacks, driving faster, stealthier, and more targeted campaigns—and what defenders can do to prepare.

SecurityWeek

A csv formatted list of #malspam campaigns that crossed my path in January to include #malware, c2, hash, subject, and some email exfil addresses:

https://gist.github.com/silence-is-best/8b91cfa90b598f71dbd7169f0391c98c

#retrohunt

🎯 Un courtier d'accès jordanien plaide coupable aux États-Unis

// Derrière le pseudonyme r1z, un Jordanien admet avoir vendu des accès à plus de 50 entreprises. L’enquête sous couverture révèle aussi son implication dans la diffusion d’un malware anti-EDR et une attaque par ransomware.

--> https://www.zataz.com/un-courtier-dacces-jordanien-plaide-coupable-aux-etats-unis/

#cybersécurité #ransomware #malware #hacking #cybercrime #zataz