Sign Up to Our Newsletter

Be the first to know the latest tech updates

[mc4wp_form id=195]
Uhale digital picture frames are secretly installing malware on boot, exposing home networks and personal data globally to hackers
Tech News

Uhale digital picture frames are secretly installing malware on boot, exposing home networks and personal data globally to hackers

Experts flag Uhale devices download malicious software automatically each time it boots up Seventeen security issues discovered across the tested digital picture frame models Major flaws include insecure TrustManager implementations and unsanitized filenames Security researchers have identified critical risks in Uhale-branded digital picture frames, revealing many devices download malicious software immediately after boot. Mobile security […]

JSON services hijacked by North Korean hackers to send out malware
Tech News

JSON services hijacked by North Korean hackers to send out malware

Lazarus Group used JSON storage services to host malware in the Contagious Interview campaign targeting developers Attackers lured victims via fake LinkedIn job offers, delivering BeaverTail, InvisibleFerret, and TsunamiKit malware Malware exfiltrates data, steals crypto, and mines Monero—while blending into normal dev workflows North Korean state-sponsored threat actors, part of the infamous Lazarus Group, have […]

WordPress users beware – GootLoader strikes again, using font hack to spread malware
Tech News

WordPress users beware – GootLoader strikes again, using font hack to spread malware

Gootloader malware resurfaced in late October 2025 after a nine-month hiatus, used to stage ransomware attacks Delivered via malicious JavaScript hidden in custom web fonts, enabling stealthy remote access and reconnaissance Linked to Storm-0494 and Vice Society; attackers reached domain controllers in under an hour in some cases After a nine-month sabbatical, the malware known […]

Hackers hijacked antivirus features to install malware – here’s what we know
Tech News

Hackers hijacked antivirus features to install malware – here’s what we know

CVE-2025-12480 in Triofox allowed zero-day exploitation via improper access control UNC6485 attackers deployed Zoho Assist, AnyDesk, and SSH tunneling for remote access Patch released July 26; newer Triofox version available October 14 for mitigation Popular remote file sharing and collaboration platform Triofox carried a critical vulnerability that was exploited as a zero-day used to deploy […]

Experts warn ClickFix malware attacks are back, and more dangerous than ever before – here’s how to stay safe
Tech News

Experts warn ClickFix malware attacks are back, and more dangerous than ever before – here’s how to stay safe

ClickFix now uses OS detection, timers, and video guides to boost malware delivery success Attackers host popups on compromised sites and promote them via Google malvertising Victims are tricked into running malware via fake problem/solution instructions in system dialogs The dreaded malware deployment technique known as ClickFix is evolving, and now comes with a timer, […]

TikTok videos used to hide dangerous malware attacks – here’s how to stay safe
Tech News

TikTok videos used to hide dangerous malware attacks – here’s how to stay safe

TikTok videos trick users into running malicious commands disguised as software activators Aura Stealer malware steals passwords, cookies, and crypto wallet data from infected systems Avoid suspicious links, use official software, and keep security tools fully updated The dreaded ClickFix malware attacks are now targeting TikTok users, tricking them into installing infostealers and losing sensitive […]

North Korean hackers found hiding crypto-stealing malware with Blockchain
Tech News

North Korean hackers found hiding crypto-stealing malware with Blockchain

UNC5342 uses blockchain smart contracts to deliver crypto-stealing malware via EtherHiding Fake jobs and coding challenges lure developers into triggering the JadeSnow loader and backdoor Blockchain’s immutability makes malware hosting resilient North Korean state-sponsored threat actors are now using public blockchains to host malicious code and deploy malware on target endpoints. This is according to […]

Cyber crooks now use fake copyright claims with AI tricks to spread new malware across sites, apps, and social platforms
Tech News

Cyber crooks now use fake copyright claims with AI tricks to spread new malware across sites, apps, and social platforms

Cybercriminals exploit copyright fear to push malware into everyday online spaces Telegram bots now double as command hubs for evolving malware threats Fake legal firms deliver malware through takedown scams in multiple languages Cybercriminals have long relied on fear as a way to manipulate victims, and copyright claims are proving to be one of the […]

LockBit malware is back – and nastier than ever, experts claim
Tech News

LockBit malware is back – and nastier than ever, experts claim

LockBit 5.0 targets Windows, Linux, and ESXi with advanced obfuscation and anti-analysis techniques Builds on LockBit 4.0, adding stealth features like DLL reflection and dynamic API resolution Found active in the wild, but no confirmed victim details or campaign success disclosed yet The notorious LockBit malware is back, and is more dangerous than ever before, […]

This sneaky Android malware has an all-new way to avoid being detected
Tech News

This sneaky Android malware has an all-new way to avoid being detected

Cybersecurity researchers have found a new version of a well-known Android banking trojan malware which sports quite a creative method of hiding in plain sight. PixPirate targets mostly Brazilian consumers with accounts on the Pix instant payment platform, which allegedly counts more than 140 million customers, and services transactions north of $250 billion.  The campaign’s […]

TechToday Logo

Your go-to destination for the latest in tech, AI breakthroughs, industry trends, and expert insights.

Get Latest Updates and big deals

Our expertise, as well as our passion for web design, sets us apart from other agencies.

Digitally Interactive  Copyright 2022-25 All Rights Reserved.