Valve Removes Video Game Demo Suspected of Being Malware

Valve Removes Video Game Demo Suspected of Being Malware

Valve removed a video game from its online store steam after users reported that a free demo for the game was installing malware on their computers. The game was called sniper: Phantom’s resolution, and promised to give players “realistic [first-person shooter] Mechanics, dynamic storytelling, and high-stakes missions, “According to an archive of its steam page, … Read more

North Korean Government Hackers Snuck Spyware on Android App Store

North Korean Government Hackers Snuck Spyware on Android App Store

A group of hackers with links to the north korean regime uploaded android spyware onto the google play app store and weight to trick some people ITO DOWNLOADING It, According to Cybecurity Firmch. In a report published on WednsAnd exclusively shared with techcrunch ahead of time, lookout details an espionage campaign involving several different samples … Read more

Cybercriminals Using Chatgpt Popularity to Spread Malware Via Facebook Accounts, Cloudsek Says

Cybercriminals Using ChatGPT Popularity to Spread Malware via Facebook Accounts, CloudSEK Says

Cyber ​​criminals are exploiting popularity of Chatgpt to spread malware through hijacked Facebook Accounts, Cyber ​​Intelligence Firm Cloudsek said on Monday. Cloudsek In Its Investigation Via Facebook ads. “Cybercriminals are capitalising on the popularity of chatgpt, exploiting facebook’s vast user base by compromising legitimate facebook accounts to distribute malware via factor ads, Putting users’ Security … Read more

Malicious Machine Learning Models Discovered on Hugging Face: Report

Malicious Machine Learning Models Discovered on Hugging Face: Report

Hugging faceThe Artificial Intelligence (AI) and Machine Learning (Ml) Hub, is said to control malicious ml models. A Cybersecurity Research Firm Discovered Two Such Models that Contain Code That Can Be Used To Package and Distribute Malware to those who download these files. As per the results, threat actors are using a hard-to-detect method, dubbed … Read more