News
CTM360 has discovered a new global malware campaign dubbed "FraudOnTok" that spreads the SparkKitty spyware through fake ...
At Black Hat USA 2025, CrowdStrike warns that cyber criminals and nation-states are weaponising GenAI to scale attacks and ...
Hackers are using generative AI to improve the speed and quality of their attacks, while simultaneously attacking enterprise ...
News: CrowdStrike's 2025 Threat Hunting Report reveals a new era of cyberattacks, where adversaries weaponize GenAI to scale ...
Black Hat USA 2025--CrowdStrike (NASDAQ: CRWD) today released the 2025 Threat Hunting Report, highlighting a new phase in modern cyberattacks: adversaries are weaponizing GenAI to scale operations and ...
A new threat targets both Android and iPhone users: SparkKitty, a powerful mobile malware strain that scans private photos to steal cryptocurrency recovery phrases and other sensitive data.
Fake crypto and TikTok apps are being used to spread SparkKitty spyware on Android and iOS, silently stealing user photos and device data.
For the unversed, SparkCat was found to use optical character recognition (OCR) to steal cryptocurrency wallet recovery phrases from images saved on infected phones.
According to Kaspersky, which also first reported the threat, SparkKitty is related to the earlier SparkCat data stealer and shares many of its methods and goals.
This spy, likely connected to the infamous SparkCat data stealer that emerged earlier this year, focuses on sensitive data, such as seed phrases for crypto wallets.
Certain technical details suggest that the new malware campaign is linked to the previously discovered SparkCat Trojan – malware (the first of its kind on iOS) with a built-in optical character ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results