Bitcoin Mining

Konni Deploys EndRAT Through Phishing, Uses KakaoTalk to Propagate Malware
CISA Flags Actively Exploited Wing FTP Vulnerability Leaking Server Paths
GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos
ClickFix Campaigns Spread MacSync macOS Infostealer via Fake AI Tool Installers
DRILLAPP Backdoor Targets Ukraine, Abuses Microsoft Edge Debugging for Stealth Espionage
Android 17 Blocks Non-Accessibility Apps from Accessibility API to Prevent Malware Abuse
OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration