WhatsApp notifies hundreds of users who installed a fake app that was actually government spyware

WhatsApp says it has notified around 200 users who were tricked into installing a malicious fake version of the chat app that contained government spyware.  WhatsApp accused Italian spyware maker SIO of creating a fake version of its messaging app for iPhones, according to an announcement the company shared with TechCrunch.   “Our security team proactively … Read more

AI Will Drive Scalable Cyberattacks in 2026: Google Cloud

Google Cloud projects that AI-driven cyberattacks will scale over 2026, impacting manufacturing, retail, and finance sectors tied to global supply chains. Rising risks around AI agents, hypervisors, and third-party providers increase exposure to extortion, IP loss, and regulatory non-compliance, requiring stronger identity and infrastructure controls.   By 2026, AI will transition from an exceptional tool … Read more

Apple Will Push Out Rare ‘Backported’ Patches to Protect iOS 18 Users From DarkSword Hacking Tool

Last week, DarkSword was then posted to open source code repository GitHub, making it all the more accessible. Security firms Malfors and Proofpoint soon after warned that another Russian hacker group linked to the Kremlin’s FSB intelligence agency was sending out phishing emails that used the technique. Independent security researcher Johnny Franks tells WIRED that … Read more

Appdome unveils Threat-Memory to track repeated attacks

Appdome has launched Threat-Memory, a feature that stores threat history inside protected iOS and Android apps and assigns a severity score that updates over time. The product targets mobile fraud and account takeover attempts that recur across multiple sessions or app installs. It records prior suspicious activity on the device and makes it available to … Read more

AI platforms open new route for malware campaigns

Cybersecurity researchers warn that AI assistants with web access could play a new role in malware campaigns. Instead of connecting directly to a command-and-control server, attackers can use AI platforms as an intermediary for communication, making malicious traffic less likely to be detected. Research by security company Check Point shows that AI assistants such as … Read more

Indonesia Cyberattacks Surge: Named Top Spam & Malware Source in 2025

Archyde Indonesia experienced a dramatic surge in cyberattacks throughout 2025, culminating in its designation as the world’s largest source of spam and malware by AwanPintar.id, a national cyber threat intelligence platform.… You can read the full story here: Indonesia Cyberattacks Surge: Named Top Spam & Malware Source in 2025. Source link

WhatsApp Deploys Rust-Based Media Parser to Block Malware on 3 Billion Devices

WhatsApp’s engineering team has rewritten its media handling library in Rust, cutting the codebase from 160,000 lines of C++ down to 90,000 lines while adding memory safety protections. The library runs on billions of devices, such as Android phones, iPhones, desktops, watches, and web browsers, making this one of the largest client-side deployments of Rust … Read more

Researchers hack malware gang via its own weak spot

Security researchers at CyberArk discovered a critical flaw in StealC malware’s infrastructure. Using an XSS vulnerability, they gained access to sessions of cybercriminals who were stealing cookies themselves. StealC is an infostealer that has been active since early 2023 and is offered as Malware-as-a-Service (MaaS). The platform focuses on stealing cookies, passwords, and other sensitive … Read more

Fake Travel Sites: Avoid Reservation Scams

Key Points Fake travel reservations exacerbate ‌travel-related stress. Travelers already face flight cancellations and overbooked hotels. Scams add financial and emotional strain. Fake Travel Reservations Add to travelers’ woes ‌ ‍ Updated ​May 30, ‌2025 ​ ‍ Travelers are facing yet another hurdle: fake travel reservations. This scam is adding to the ‍already significant stress … Read more

Google uncovers malware campaign by China-linked hackers using Calendar events in a sophisticated cyberattack

In a concerning revelation, Google’s Threat Intelligence Group (GTIG) has uncovered that a group of hackers linked to China used Google Calendar as a tool to steal sensitive information from individuals. The group, known as APT41 or HOODOO, is believed to have ties to the Chinese government. According to GTIG, the attack began with a … Read more