Skip to content
Sunday, November 30, 2025

Cyberbytes Daily

Your one stop for cybersecurity news

  • Home

Secretive MaaS Group ‘TAG-150’ Develops Novel ‘CastleRAT’

Posted on September 5, 2025
Secretive MaaS Group ‘TAG-150’ Develops Novel ‘CastleRAT’

TAG-150 is running a multifaceted and relatively successful malware-as-a-service operation, without advertising itself on the Dark Web.

​The original article found on darkreading Read More

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on X (Opens in new window) X

Like this:

Like Loading...
Posted in Cyber Security News

Post navigation

Previous: Scammers Are Using Grok to Spread Malicious Links on X
Next: GOP Cries Censorship Over Spam Filters That Work

Related Posts

The Triple Threat of Burnout: Overworked, Unsatisfied, Trapped
  • Cyber Security News

The Triple Threat of Burnout: Overworked, Unsatisfied, Trapped

  • cyberbytes
  • June 18, 2025
  • 0

Many cybersecurity professionals still don’t feel comfortable admitting when they need a break. And the impact goes beyond being overworked. ​The original article found on […]

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on X (Opens in new window) X

Like this:

Like Loading...
OpenAI Atlas Browser Vulnerability Lets Attackers Execute Malicious Scripts in ChatGPT
  • Cyber Security News

OpenAI Atlas Browser Vulnerability Lets Attackers Execute Malicious Scripts in ChatGPT

  • cyberbytes
  • October 28, 2025
  • 0

Cybersecurity firm LayerX has identified a critical vulnerability in OpenAI’s ChatGPT Atlas browser that allows malicious actors to inject harmful instructions into ChatGPT’s memory and […]

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on X (Opens in new window) X

Like this:

Like Loading...
  • Cyber Security News

PowerShell Loaders Use In-Memory Execution to Evade Disk-Based Detection

  • cyberbytes
  • June 20, 2025
  • 0

A recent threat hunting session has revealed a sophisticated PowerShell script, named y1.ps1, hosted in an open directory on a Chinese server (IP: 123.207.215.76). First […]

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on X (Opens in new window) X

Like this:

Like Loading...
Copyright © 2025 Cyberbytes Daily Theme: Press News By Adore Themes.
%d