news
Breaking Cyber News From Cyberint
Breaking news feed of the latest cyber incidents, breaches, vulnerabilities, malware, ransomware and so much more.
- All Items
- Data Encrypted For Impact
- Israel
- Business Services
- Handala
- Jobinfo
- Asia
- Middle East
- Shelter Locations In Israel
- Retail
- Saudi Arabia
- Saudi Games
- Cyber Fattah Team
- Ben Horin & Alexandrovitz
- Zachary Levi And Sons - Construction
- Sivim It
- Government
- Kibbutz Almog
- Manufacturing
- Saban Brands Israel
- Mprest
- Digitalghost
- Evil_Byte
- The Knesset
- Nobitex
- Gonjeshke Darande
- Sentap
- South-Eastern Asia
- Indonesia
- Chemicals And Allied Products
- Kimia Farma
- exclusive
- Northern Europe
- Transportation
- Scania
- Hensi
- Sweden
- Europe
- Media
- Tbn Israel
- Education
- Weizmann Institute Of Science
- Israeli Air Force
- Resistancetrench
- Israel Antiquities Authority
- Dienet
- North America
- Wazuh
- Mirai
- Cve-2025-24016
- CVE-2025-24016
- United States
- Epsilor Electric Fuel
- Clayoxtymus1337
- Technology
- Advanced Weapons And Equipment India
- India
- Southern Asia
- Fin6
- More_Eggs
- Cryptocurrency
- Alex Lab
- Critical Infrastructures
- Zoldyck
- Edf Energy
- United Kingdom
- Ingress Tool Transfer
- Match Legitimate Name Or Location
- Telecommunications
- Spearphishing Link
- Sudo And Sudo Caching
- Unix Shell
- Spectrum
- Credentials In Files
- Amos
- Disable Or Modify Tools
- Israel Defense Forces
- Food And Kindred Products
- Coca-Cola Europacific Partners
- Ghna
- Italy
- Locauto
- Automotive
- Southern Europe
- Spain
- Whitecoat
- Mercadona
- Ups
- Healthcare
- Wow Health Solutions
- Rip_Real_World
- Cyprus Airways
- Netsupport Rat
- Illeak
- Tel Aviv University
- Desec0X
- Cyberlock
- Lucky_Gh0$T
- Yashma
- Chaos
- Numero
- Unc6032
- Deloitte
- 303
- Gucci
- Credentials From Password Stores
- Screen Capture
- File And Directory Discovery
- Credentials From Web Browsers
- Virtualization/Sandbox Evasion
- Drive-By Compromise
- System Information Discovery
- Data From Local System
- Phishing
- Password Managers
- Exfiltration Over C2 Channel
- Obfuscated Files Or Information
- Windows Credential Manager
- Eddiestealer
- User Execution
- Command And Scripting Interpreter
- Input Capture
- Superloop
- Australia
- W_Tchdogs
- Australia And New Zealand
- Escape To Host
- Docker
- Deploy Container
- Remote System Discovery
- Lateral Tool Transfer
- Exploitation For Client Execution
- Change Default File Association
- External Remote Services
- Exploit Public-Facing Application
- Smb/Windows Admin Shares
- Web Protocols
- Resource Hijacking
- Network Service Discovery
- Eastern Europe
- Romania
- Venom Rat
- Bitdefender
- Cameleon
- Financial Theft
- CVE-2023-20118
- Cve-2023-20118
- Cisco
- Eastern Asia
- Vicioustrap
- Macao Special Administrative Region
- Cve-2025-0944
- CVE-2025-0944
- Uat-6382
- Trimble
- Tetraloader
- File Deletion
- Obfuscated Files Or Information: Encrypted Or Encoded Data
- Rundll32
- Regsvr32
- Masquerade Task Or Service
- Powershell
- Malicious File
- Dynamic-Link Library Injection
- Valleyrat
- Reflective Code Loading
- Silver Fox
- China
- Scheduled Task
- Process Discovery
- Trickbot
- Qakbot
- Bumblebee
- Warmcookie
- Danabot
- Cetus
- Purehvnc
- Bytebreaker
- Viralgod
- Mexico
- Telcel
- Latin America And The Caribbean
- Peter Green Chilled
- Cellcom
-
Jun 10, 2025
New Clickfix Infostealer Campaign Targets macOS Users
Cybersecurity researchers have identified a new malware campaign that uses social engineering tactics to distribute an information stealer known as Atomic macOS Stealer (AMOS) targeting Apple macOS systems. The campaign employs typosquatting domains that mimic the U.S.-based telecom provider Spectrum, tricking users into executing a malicious shell script that steals system passwords and downloads the AMOS variant. The attack begins on a fake webpage that prompts users to complete a CAPTCHA verification, ultimately leading them to execute harmful commands under the guise of fixing a non-existent issue. The campaign is believed to be orchestrated by Russian-speaking cybercriminals, as indicated by the presence of Russian language comments in the malware's code.