Horabot's 'Sapecar' Strikes Mexico: Old Tricks, New CAPTCHA Lies
Fake CAPTCHA? Click anyway? That's how Horabot's 'Sapecar' sneaks into Mexican banks. Kaspersky stopped it cold—but it's a reminder: vigilance isn't optional.
In-depth coverage of the latest Ransomware & Malware developments, trends, and analysis — curated daily.
Fake CAPTCHA? Click anyway? That's how Horabot's 'Sapecar' sneaks into Mexican banks. Kaspersky stopped it cold—but it's a reminder: vigilance isn't optional.
Imagine searching for Proxifier software, clicking a top GitHub result, and unwittingly launching a cyber relay race straight to your crypto wallet. ClipBanker doesn't rush—it endures, layer by layer, until it owns your clipboard.
Brazil's cybercriminals just upped their game with GoPix, a banking Trojan that squats in your RAM like an uninvited guest. Forget disk traces—it's pure stealth, targeting Pix and crypto with MITM tricks.
Destructive cyberattacks aren't if—they're when. Mandiant's latest guide arms orgs with scalable defenses against wipers and data shredders.
A record number of victims splashed across ransomware data leak sites in 2025 — yet operators' profits are tanking. Google's deep dive into real incidents shows why the game's changing, but not ending.
Everyone figured ransomware was slowing down after the big busts. Then Storm-1175 shows up, turning fresh CVEs into extortion goldmines overnight.
Imagine hackers owning your entire data center from a forgotten admin console. BRICKSTORM malware does exactly that to vSphere setups, and most orgs are wide open.
A single developer. AI tools. Malware so slick experts thought it was a team effort. VoidLink just reset the bar for AI in cybercrime.
Picture this: you're French, your data's already leaked everywhere, and now a 'Windows update' button tempts you. Click it, and crooks grab your passwords. Real people, real theft.
Everyone figured Chaos stuck to routers and edges. Wrong. This variant's prowling misconfigured clouds, proxying traffic to hide the real crooks. Buckle up.
You're unzipping that shady RAR from a phishing email, double-clicking cbmjlzan.JS. Bad move—it's 10MB of obfuscated nightmare code that quietly installs Formbook stealer.
Another day, another botnet. Masjesu turns your forgotten router into a DDoS drone, all booked via Telegram. Stealthy, persistent, and laughing at defenses.