Toggle light / dark theme

Get the latest international news and world events from around the world.

Log in for authorized contributors

New Android Malware Surge Hits Devices via Overlays, Virtualization Fraud, and NFC Theft

Cybersecurity researchers have exposed the inner workings of an Android malware called AntiDot that has compromised over 3,775 devices as part of 273 unique campaigns.

“Operated by the financially motivated threat actor LARVA-398, AntiDot is actively sold as a Malware-as-a-Service (MaaS) on underground forums and has been linked to a wide range of mobile campaigns,” PRODAFT said in a report shared with The Hacker News.

AntiDot is advertised as a “three-in-one” solution with capabilities to record the device screen by abusing Android’s accessibility services, intercept SMS messages, and extract sensitive data from third-party applications.

1,500+ Minecraft Players Infected by Java Malware Masquerading as Game Mods on GitHub

The campaign is suspected to be the work of a Russian-speaking threat actor owing to the presence of several artifacts written in the Russian language and the timezone of the attacker’s commits (UTC+03:00). It’s estimated that more than 1,500 devices may have fallen prey to the scheme.

“This case highlights how popular gaming communities can be exploited as effective vectors for malware distribution, emphasizing the importance of caution when downloading third-party content,” the researchers said.

“The Stargazers Ghost Network has been actively distributing this malware, targeting Minecraft players seeking mods to enhance their gameplay. What appeared to be harmless downloads were, in fact, Java-based loaders that deployed two additional stealers, capable of exfiltrating credentials and other sensitive data.”

Cloudflare blocks record 7.3 Tbps DDoS attack against hosting provider

Cloudflare says it mitigated a record-breaking distributed denial of service (DDoS) attack in May 2025 that peaked at 7.3 Tbps, targeting a hosting provider.

DDoS attacks flood targets with massive amounts of traffic with the sole aim to overwhelm servers and create service slowdowns, disruptions, or outages.

This new attack, which is 12% larger than the previous record, delivered a massive data volume of 37.4 TB in just 45 seconds. This is the equivalent of about 7,500 hours of HD streaming or 12,500,000 jpeg photos.

DuckDuckGo beefs up scam defense to block fake stores, crypto sites

The DuckDuckGo web browser has expanded its built-in Scam Blocker tool to protect against a broader range of online scams, including fake e-commerce, cryptocurrency exchanges, and “scareware” sites.

DuckDuckGo is a privacy-focused web browser and search engine that doesn’t track users’ searchers or browsing history.

The browser, which became available as a public beta for macOS and Windows in October 2022 and June 2023, respectively, blocks all trackers by default, does not engage in personalized search profiling, and offers powerful anonymity tools.

Microsoft investigates OneDrive bug that breaks file search

Microsoft is investigating a known OneDrive issue that is causing searches to appear blank for some users or return no results even when searching for files they know they’ve already uploaded.

In a support document updated this week, the company shared that this bug impacts Windows, Android, iOS, and web users.

“Some OneDrive personal account users may notice that search results appear blank or don’t return files they know exist. While the files are still present and accessible, they don’t appear in search results,” Microsoft explains in a support document published this week.

Webinar: Stolen credentials are the new front door to your network

Cybercriminals no longer need zero-day exploits or other vulnerabilities to breach your systems—these days, they just log in.

On July 9th at 2:00 PM ET, BleepingComputer and SC Media will co-host a live webinar with identity security expert Darren Siegel of Specops Software (part of Outpost24), exploring how threat actors are increasingly breaching networks by simply logging in with stolen credentials.

The webinar “Stolen credentials: The New Front Door to Your Network” will unpack the real-world mechanics behind credential-based attacks and how to stop them before damage is done.