Hackers are hiding malware in images hosted on reputable websites to compromise computers and steal sensitive data like passwords and cryptocurrency wallet information. Researchers from HP Wolf Security found large campaigns spreading VIP Keylogger and 0bj3ctivityStealer, and using phishing kits and AI tools to trick users. The malware is often concealed in Excel files attached to phishing emails pretending to be invoices or purchase orders.

Outlaw Group Uses SSH Brute-Force to Deploy Cryptojacking Malware on Linux Servers
Cybersecurity researchers have revealed details about Outlaw, an “auto-propagating” cryptocurrency mining botnet that targets SSH servers with weak credentials. The Romanian-origin malware performs SSH brute-force