malware

Preview image for: Malware-Laced Claude Code Leak: A Deep Dive into the Escalating Supply Chain Cyber Crisis

Malware-Laced Claude Code Leak: A Deep Dive into the Escalating Supply Chain Cyber Crisis

Exploiting the Claude AI code leak with bonus malware, FBI wiretap tools hack, and Cisco source code theft signals a critical cyber threat landscape.
Preview image for: Stealthy Exfiltration: 'ChatGPT Ad Blocker' Chrome Extension Unmasked as Covert Spyware

Stealthy Exfiltration: 'ChatGPT Ad Blocker' Chrome Extension Unmasked as Covert Spyware

A malicious Chrome extension, 'ChatGPT Ad Blocker,' was caught harvesting user conversations, posing a severe data privacy risk.
Preview image for: FriendlyDealer Unmasked: Sophisticated App Store Impersonation Pushing Unvetted Gambling Apps

FriendlyDealer Unmasked: Sophisticated App Store Impersonation Pushing Unvetted Gambling Apps

FriendlyDealer creates 1,500+ fake app stores, mirroring Google/Apple, to distribute unvetted, potentially malicious gambling apps.
Preview image for: INTERPOL's Synergia III: A Decisive Blow Against Global Cybercrime Infrastructure & 45,000 Malicious IPs Neutralized

INTERPOL's Synergia III: A Decisive Blow Against Global Cybercrime Infrastructure & 45,000 Malicious IPs Neutralized

INTERPOL's Operation Synergia III led to 94 arrests and the takedown of 45,000 malicious IPs across 72 countries, disrupting major cybercrime networks.
Preview image for: Malicious Claws: Bing Search Poisoning Leads to Fake OpenClaw Installers on GitHub, Delivering Malware

Malicious Claws: Bing Search Poisoning Leads to Fake OpenClaw Installers on GitHub, Delivering Malware

Beware: Bing search results for OpenClaw led users to malicious GitHub repositories installing info-stealers and RATs, not legitimate software.
Preview image for: XWorm 7.2: Sophisticated Phishing Campaign Leverages Excel Exploits and JPEG Camouflage for PC Hijack

XWorm 7.2: Sophisticated Phishing Campaign Leverages Excel Exploits and JPEG Camouflage for PC Hijack

New phishing campaign deploys XWorm 7.2 via malicious Excel files, hiding malware in JPEGs and processes to steal data.
Preview image for: AI Assistants as Covert C2 Relays: A New Frontier in Evasive Malware Communication

AI Assistants as Covert C2 Relays: A New Frontier in Evasive Malware Communication

Exploiting AI assistants like Grok and Copilot for covert C2, a sophisticated threat demanding advanced cybersecurity defenses.
Preview image for: Malicious MoltBot Onslaught: Weaponized AI Skills Pushing Password Stealers

Malicious MoltBot Onslaught: Weaponized AI Skills Pushing Password Stealers

Over 230 malicious OpenClaw/MoltBot AI skills distributed, pushing password-stealing malware via official registries and GitHub.
Preview image for: ISC Stormcast Insights: Advanced Phishing, Tracking, and 2026 Cyber Defense Strategies

ISC Stormcast Insights: Advanced Phishing, Tracking, and 2026 Cyber Defense Strategies

Analyzing ISC Stormcast (Jan 23, 2026) on advanced phishing, tracking (iplogger.org), malware, and proactive cyber defense strategies.
X
To give you the best possible experience, https://iplogger.org uses cookies. Using means you agree to our use of cookies. We have published a new cookies policy, which you should read to find out more about the cookies we use. View Cookies politics