<rss version="2.0"
    xmlns:dc="http://purl.org/dc/elements/1.1/"
    xmlns:content="http://purl.org/rss/1.0/modules/content/"
    xmlns:atom="http://www.w3.org/2005/Atom"
    xmlns:media="http://search.yahoo.com/mrss/">
    <channel><title>Consumer Insights</title><description>News, views and insights from the Bitdefender experts</description><link>https://www.bitdefender.com/en-au/blog/hotforsecurity/</link><image><url>https://download.bitdefender.com/resources/images/favicon/favicon-32x32.png</url><title>Consumer Insights</title><link>https://www.bitdefender.com/en-au/blog/hotforsecurity/</link></image><generator>Bitdefender Blog</generator><lastBuildDate>Thu, 12 Mar 2026 13:23:46 GMT</lastBuildDate><atom:link href="https://www.bitdefender.com/nuxt/api/en-au/rss/hotforsecurity/threats/" rel="self" type="application/rss+xml"/><ttl>1800</ttl><item><title>FAN Courier SMS Scam Targets 1 Million Romanians in Massive WhatsApp Takeover Campaign</title><description><![CDATA[A new SMS phishing campaign in Romania is impersonating FAN Courier, one of the largest courier and express delivery companies, to trick users into entering their WhatsApp verification codes on fake websites. ]]></description><link>https://www.bitdefender.com/en-au/blog/hotforsecurity/fan-courier-sms-scam-targets-1-million-romanians-in-massive-whatsapp-takeover-campaign</link><guid isPermaLink="false">69b1b1602fa53a9f2eef4bca</guid><category><![CDATA[Threats]]></category><dc:creator>Silviu STAHIE</dc:creator><pubDate>Thu, 12 Mar 2026 09:01:42 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2026/03/fan_courier_whatsapp.png" medium="image"/><content:encoded><![CDATA[A new SMS phishing campaign in Romania is impersonating FAN Courier, one of the largest courier and express delivery companies, to trick users into entering their WhatsApp verification codes on fake websites. ]]></content:encoded></item><item><title>As F1 Returns, So Do the Risks of Free Streaming</title><description><![CDATA[Easy-to-find websites that promise free streaming can seem like a great deal, especially when subscription costs continue to rise. But they are rarely free in any real sense]]></description><link>https://www.bitdefender.com/en-au/blog/hotforsecurity/f1-returns-risks-of-free-streaming</link><guid isPermaLink="false">69aa7efe2fa53a9f2eef482b</guid><category><![CDATA[Threats]]></category><dc:creator>Silviu STAHIE</dc:creator><pubDate>Fri, 06 Mar 2026 07:59:54 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2026/03/Gemini_Generated_Image_xyrhd9xyrhd9xyrh.png" medium="image"/><content:encoded><![CDATA[Easy-to-find websites that promise free streaming can seem like a great deal, especially when subscription costs continue to rise. But they are rarely free in any real sense]]></content:encoded></item><item><title>Hugging Face Repositories Used to Spread Android RAT</title><description><![CDATA[Bitdefender security researchers have identified a new Android malware campaign that used the Hugging Face public-facing infrastructure to host its malicious files.]]></description><link>https://www.bitdefender.com/en-au/blog/hotforsecurity/hugging-face-android-rat-malware</link><guid isPermaLink="false">697cd1732fa53a9f2eef3048</guid><category><![CDATA[Threats]]></category><dc:creator>Silviu STAHIE</dc:creator><pubDate>Fri, 30 Jan 2026 15:50:20 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2026/01/ChatGPT-Image-Jan-28--2026--05_18_14-PM.png" medium="image"/><content:encoded><![CDATA[Bitdefender security researchers have identified a new Android malware campaign that used the Hugging Face public-facing infrastructure to host its malicious files.]]></content:encoded></item><item><title>Cybercriminals Use Fake Leonardo DiCaprio Film Torrent to Spread Agent Tesla Malware</title><description><![CDATA[Cybersecurity researchers from Bitdefender have discovered that a fake torrent file of Leonardo DiCaprio’s new film, One Battle After Another, hides a complex series of scripts designed to infect Windows users with a powerful trojan named Agent Tesla.  

When people download the movies, they expect a video file. Instead, the torrent offers a hidden set of PowerShell scripts that unpack, decode, and execute a memory-resident malware payload.  

Criminals use popular movies because the number of p]]></description><link>https://www.bitdefender.com/en-au/blog/hotforsecurity/fake-leonardo-dicaprio-film-torrent-agent-tesla-malware</link><guid isPermaLink="false">693ae3fa61720986fd7f4dc0</guid><category><![CDATA[Threats]]></category><dc:creator>Silviu STAHIE</dc:creator><pubDate>Thu, 11 Dec 2025 15:39:37 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2025/12/90cbbfab-b875-4654-a654-df248f9c8a73.png" medium="image"/><content:encoded><![CDATA[Cybersecurity researchers from Bitdefender have discovered that a fake torrent file of Leonardo DiCaprio’s new film, One Battle After Another, hides a complex series of scripts designed to infect Windows users with a powerful trojan named Agent Tesla.  

When people download the movies, they expect a video file. Instead, the torrent offers a hidden set of PowerShell scripts that unpack, decode, and execute a memory-resident malware payload.  

Criminals use popular movies because the number of p]]></content:encoded></item><item><title>Bitdefender and Netgear 2025 IoT Security Landscape Report Shows Alarming Rise in Smart Home Threats</title><description><![CDATA[Bitdefender, in partnership with NETGEAR, has released the 2025 IoT Security Landscape Report, a data-rich look at the risks facing connected homes worldwide.  

Using telemetry from 6.1 million smart homes and data from over 58 million IoT devices, the report offers a rare glimpse into how everyday gadgets – from TVs and cameras to routers and solar inverters – are shaping the next generation of cyber threats. 

Between January and October 2025, Bitdefender technologies detected 13.6 billion at]]></description><link>https://www.bitdefender.com/en-au/blog/hotforsecurity/bitdefender-and-netgear-2025-iot-security-landscape-report-shows-alarming-rise-in-smart-home-threats</link><guid isPermaLink="false">68fa8980d9ea1a4ef3db485e</guid><category><![CDATA[Threats]]></category><dc:creator>Bitdefender</dc:creator><pubDate>Wed, 29 Oct 2025 13:12:07 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2025/10/2025_iot_security_report.jpg" medium="image"/><content:encoded><![CDATA[Bitdefender, in partnership with NETGEAR, has released the 2025 IoT Security Landscape Report, a data-rich look at the risks facing connected homes worldwide.  

Using telemetry from 6.1 million smart homes and data from over 58 million IoT devices, the report offers a rare glimpse into how everyday gadgets – from TVs and cameras to routers and solar inverters – are shaping the next generation of cyber threats. 

Between January and October 2025, Bitdefender technologies detected 13.6 billion at]]></content:encoded></item><item><title>What are Roblox Executors and Why Do Parents Really Need to Know About Them</title><description><![CDATA[As a parent, you are unlikely to hear about Roblox Executors.

You know your kids play Roblox – a massive online universe where millions build, play, and socialize every day. But that gaming platform is much more complex than most people think.

Kids are extremely resourceful; they watch YouTube tutorials on how to make the most of Roblox, they go to forums, join Discord, and frequent other channels. Left to their own devices, they will figure out what they need to do.

Sooner or later, many dis]]></description><link>https://www.bitdefender.com/en-au/blog/hotforsecurity/roblox-executors-parents-danger-malware</link><guid isPermaLink="false">68e917d5d6c94204d9819ae9</guid><category><![CDATA[Scam]]></category><category><![CDATA[Family Safety]]></category><category><![CDATA[Threats]]></category><dc:creator>Silviu STAHIE</dc:creator><pubDate>Fri, 10 Oct 2025 14:59:04 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2025/10/c642a4af-116a-4539-a0f6-f30a2977f47c.png" medium="image"/><content:encoded><![CDATA[As a parent, you are unlikely to hear about Roblox Executors.

You know your kids play Roblox – a massive online universe where millions build, play, and socialize every day. But that gaming platform is much more complex than most people think.

Kids are extremely resourceful; they watch YouTube tutorials on how to make the most of Roblox, they go to forums, join Discord, and frequent other channels. Left to their own devices, they will figure out what they need to do.

Sooner or later, many dis]]></content:encoded></item><item><title>iCloud Calendar Exploited to Push Phishing Emails Via Apple Servers</title><description><![CDATA[Scammers exploit Apple’s trusted email system to distribute callback phishing scams.


Callback scams disguised as payment alerts

Threat actors are abusing Apple’s iCloud Calendar feature to distribute phishing emails that appear to originate directly from Apple’s servers. Perpetrators are exploiting this feature to make fraudulent messages look legitimate so they slip past spam detection filters.

In one reported case, a recipient received what appeared to be a PayPal payment receipt for $599.]]></description><link>https://www.bitdefender.com/en-au/blog/hotforsecurity/icloud-calendar-exploited-to-push-phishing-emails-via-apple-servers</link><guid isPermaLink="false">68bed15cd6c94204d9818c6c</guid><category><![CDATA[Industry News]]></category><category><![CDATA[Threats]]></category><category><![CDATA[Scam]]></category><dc:creator>Vlad CONSTANTINESCU</dc:creator><pubDate>Mon, 08 Sep 2025 12:55:41 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2025/09/kasia-derenda-Fl3Rf_t8dMs-unsplash.jpg" medium="image"/><content:encoded><![CDATA[Scammers exploit Apple’s trusted email system to distribute callback phishing scams.


Callback scams disguised as payment alerts

Threat actors are abusing Apple’s iCloud Calendar feature to distribute phishing emails that appear to originate directly from Apple’s servers. Perpetrators are exploiting this feature to make fraudulent messages look legitimate so they slip past spam detection filters.

In one reported case, a recipient received what appeared to be a PayPal payment receipt for $599.]]></content:encoded></item><item><title>Cybercriminals Exploit Anthropic’s AI in Global Extortion Campaign</title><description><![CDATA[Anthropic warns of a turning point in AI-fueled cybercrime after its Claude Code tool was misused in large-scale extortion attacks.


AI weaponization flourishes

In a new report, AI company Anthropic has revealed that a cybercrime gang hijacked its popular Claude Code service to wage an extensive malicious campaign of data theft and extortion.

The operation, tracked as GTG-2002, reportedly targeted at least 17 organizations worldwide, using the AI system as both a support tool and an active op]]></description><link>https://www.bitdefender.com/en-au/blog/hotforsecurity/cybercriminals-exploit-anthropics-ai-in-global-extortion-campaign</link><guid isPermaLink="false">68b031ebd6c94204d98188c1</guid><category><![CDATA[Industry News]]></category><category><![CDATA[Threats]]></category><dc:creator>Vlad CONSTANTINESCU</dc:creator><pubDate>Thu, 28 Aug 2025 10:43:43 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2025/08/kaptured-by-kasia-LUkBIQ2nwvg-unsplash.jpg" medium="image"/><content:encoded><![CDATA[Anthropic warns of a turning point in AI-fueled cybercrime after its Claude Code tool was misused in large-scale extortion attacks.


AI weaponization flourishes

In a new report, AI company Anthropic has revealed that a cybercrime gang hijacked its popular Claude Code service to wage an extensive malicious campaign of data theft and extortion.

The operation, tracked as GTG-2002, reportedly targeted at least 17 organizations worldwide, using the AI system as both a support tool and an active op]]></content:encoded></item><item><title>Your AI Browser Could Be Hijacked by a Simple Hidden Message, Researchers Warn</title><description><![CDATA[Invisible prompts on websites could trick AI assistants into exposing your most sensitive data.


Rising risks in agentic browsing

The next generation of AI-powered browsers is moving beyond simple summarization to performing real-world tasks such as booking flights or handling banking requests for users. While this ushers in a whole new world of convenience and efficiency, it also brings various drawbacks, especially concerning security.

As users place more trust in these AI entities, the ave]]></description><link>https://www.bitdefender.com/en-au/blog/hotforsecurity/your-ai-browser-could-be-hijacked-by-a-simple-hidden-message-researchers-warn</link><guid isPermaLink="false">68a883c4d6c94204d98186a5</guid><category><![CDATA[Industry News]]></category><category><![CDATA[Threats]]></category><dc:creator>Vlad CONSTANTINESCU</dc:creator><pubDate>Fri, 22 Aug 2025 14:57:03 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2025/09/man-1246277_1920.jpg" medium="image"/><content:encoded><![CDATA[Invisible prompts on websites could trick AI assistants into exposing your most sensitive data.


Rising risks in agentic browsing

The next generation of AI-powered browsers is moving beyond simple summarization to performing real-world tasks such as booking flights or handling banking requests for users. While this ushers in a whole new world of convenience and efficiency, it also brings various drawbacks, especially concerning security.

As users place more trust in these AI entities, the ave]]></content:encoded></item><item><title>WinRAR Zero-Day Exploit Actively Targeted in Ongoing Attacks</title><description><![CDATA[Users urged to update WinRAR version 7.13 to patch a critical vulnerability under active exploitation.


Critical zero-day CVE-2025-8088 patched

A newly discovered zero-day vulnerability in WinRAR, tracked as CVE-2025-8088, has been patched following reports of active exploitation in the wild. The flaw, with a CVSS severity score of 8.8, affects the Windows version of WinRAR and stems from a path traversal bug that enables arbitrary code execution through malicious archive files.

According to ]]></description><link>https://www.bitdefender.com/en-au/blog/hotforsecurity/winrar-zero-day-exploit-actively-targeted-in-ongoing-attacks</link><guid isPermaLink="false">6899f177d6c94204d9818244</guid><category><![CDATA[Industry News]]></category><category><![CDATA[Threats]]></category><dc:creator>Vlad CONSTANTINESCU</dc:creator><pubDate>Mon, 11 Aug 2025 13:47:29 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2025/08/WinRAR-Zero-Day-Exploit-Actively-Targeted-in-Ongoing-Attacks.png" medium="image"/><content:encoded><![CDATA[Users urged to update WinRAR version 7.13 to patch a critical vulnerability under active exploitation.


Critical zero-day CVE-2025-8088 patched

A newly discovered zero-day vulnerability in WinRAR, tracked as CVE-2025-8088, has been patched following reports of active exploitation in the wild. The flaw, with a CVSS severity score of 8.8, affects the Windows version of WinRAR and stems from a path traversal bug that enables arbitrary code execution through malicious archive files.

According to ]]></content:encoded></item><item><title>Gemini AI Compromised Through Malicious Calendar Invites, Researchers Warn</title><description><![CDATA[A study reveals how prompt injection via calendar invites can trigger real-world intrusions through Google’s Gemini assistant.


Weaponizing calendar invites to hijack AI

A new security study titled Invitation Is All You Need reveals that Google’s Gemini AI assistant is vulnerable to a subtle, yet highly effective attack vector: calendar invites. Researchers Ben Nassi (Tel Aviv University), Stav Cohen (Technion), and Or Yair (SafeBreach) showed that embedding malicious prompts within titles, em]]></description><link>https://www.bitdefender.com/en-au/blog/hotforsecurity/gemini-ai-compromised-through-malicious-calendar-invites-researchers-warn</link><guid isPermaLink="false">689602aad6c94204d9818194</guid><category><![CDATA[Industry News]]></category><category><![CDATA[Threats]]></category><dc:creator>Vlad CONSTANTINESCU</dc:creator><pubDate>Fri, 08 Aug 2025 14:01:12 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2025/08/appshunter-io-jKMWLRrzdfk-unsplash.jpg" medium="image"/><content:encoded><![CDATA[A study reveals how prompt injection via calendar invites can trigger real-world intrusions through Google’s Gemini assistant.


Weaponizing calendar invites to hijack AI

A new security study titled Invitation Is All You Need reveals that Google’s Gemini AI assistant is vulnerable to a subtle, yet highly effective attack vector: calendar invites. Researchers Ben Nassi (Tel Aviv University), Stav Cohen (Technion), and Or Yair (SafeBreach) showed that embedding malicious prompts within titles, em]]></content:encoded></item><item><title>Mirror in the Dark: What the Darknet Tells Us about Ourselves</title><description><![CDATA[For most, the darknet spurs images of shadowy hackers, illegal marketplaces, and underground crime rings. While there is some truth in all of these images, it's a distorted reflection of our society. It's actually more like a mirror that depicts the desires and vulnerabilities of the people using the darknet.


From privacy to profit: origins of the darknet



There was a time when the darknet was only a hidden network layered underneath the internet we know today. In fact, its ancestor was ARPA]]></description><link>https://www.bitdefender.com/en-au/blog/hotforsecurity/mirror-in-the-dark</link><guid isPermaLink="false">6890d2ccd6c94204d9817e73</guid><category><![CDATA[Threats]]></category><dc:creator>Silviu STAHIE</dc:creator><pubDate>Wed, 06 Aug 2025 13:03:31 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2025/08/f706724c-0d47-4f54-9a17-dcc6f0789125.png" medium="image"/><content:encoded><![CDATA[For most, the darknet spurs images of shadowy hackers, illegal marketplaces, and underground crime rings. While there is some truth in all of these images, it's a distorted reflection of our society. It's actually more like a mirror that depicts the desires and vulnerabilities of the people using the darknet.


From privacy to profit: origins of the darknet



There was a time when the darknet was only a hidden network layered underneath the internet we know today. In fact, its ancestor was ARPA]]></content:encoded></item><item><title>Pi2Day Scams: Crypto Users Targeted in Coordinated Facebook Ad Campaign Delivering Malware and Stealing Wallets</title><description><![CDATA[The Pi2Day event, celebrated June 28, is a highly anticipated moment for the Pi Network community, traditionally marked by feature launches, development updates, and platform milestones. This year, though, the celebration has attracted cybercriminals, who are running a malicious ad campaign on Facebook to phish for crypto wallet recovery phrases and spread malware.

Bitdefender Labs researcher Ionut Baltariu has identified this wave of scams as part of a larger, ongoing operation that also inclu]]></description><link>https://www.bitdefender.com/en-au/blog/hotforsecurity/pi2day-scams-crypto-users-targeted-in-coordinated-facebook-ad-campaign-delivering-malware-and-stealing-wallets</link><guid isPermaLink="false">685f1042fd8b21e92e182d72</guid><category><![CDATA[Scam]]></category><category><![CDATA[Threats]]></category><dc:creator>Alina BÎZGĂ</dc:creator><pubDate>Fri, 27 Jun 2025 21:47:23 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2025/06/Pi2Day-Scams.jpeg" medium="image"/><content:encoded><![CDATA[The Pi2Day event, celebrated June 28, is a highly anticipated moment for the Pi Network community, traditionally marked by feature launches, development updates, and platform milestones. This year, though, the celebration has attracted cybercriminals, who are running a malicious ad campaign on Facebook to phish for crypto wallet recovery phrases and spread malware.

Bitdefender Labs researcher Ionut Baltariu has identified this wave of scams as part of a larger, ongoing operation that also inclu]]></content:encoded></item><item><title>Facebook Ad Scam Tricks Investors with Fake Messages and Malware Disguised as ‘Verified Facebook App’</title><description><![CDATA[Cybercriminals are once again exploiting Facebook’s ad platform in a malicious campaign that lures users into downloading malware under the guise of resolving fake account problems. This time, they’re using brands like Binance and TradingView to grab the attention of investors and traders, leading victims to install a phony Facebook “desktop application.”


What’s Happening?

According to Bitdefender researcher Andreea Olariu, users are being exposed to malicious sponsored ads in Facebook’s righ]]></description><link>https://www.bitdefender.com/en-au/blog/hotforsecurity/facebook-ad-scam-tricks-investors-with-fake-messages-and-malware-disguised-as-verified-facebook-app</link><guid isPermaLink="false">685f0e99fd8b21e92e182d4e</guid><category><![CDATA[Scam]]></category><category><![CDATA[Threats]]></category><dc:creator>Alina BÎZGĂ</dc:creator><pubDate>Fri, 27 Jun 2025 21:41:52 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2025/06/Facebook-Ad-Scam-Tricks-Investors-with-Fake-Messages-and-Malware-Disguised-as--Verified-Facebook-App-.jpg" medium="image"/><content:encoded><![CDATA[Cybercriminals are once again exploiting Facebook’s ad platform in a malicious campaign that lures users into downloading malware under the guise of resolving fake account problems. This time, they’re using brands like Binance and TradingView to grab the attention of investors and traders, leading victims to install a phony Facebook “desktop application.”


What’s Happening?

According to Bitdefender researcher Andreea Olariu, users are being exposed to malicious sponsored ads in Facebook’s righ]]></content:encoded></item><item><title>Fake Download of Mission: Impossible – The Final Reckoning Movie Deploys Lumma Stealer</title><description><![CDATA[Mission: Impossible – The Final Reckoning is now in theaters, and many of the publicly available peer-to-peer sharing websites are already offering the movie as a download. Public interest in such a blockbuster gives cyberattackers a way to serve dangerous malware through unorthodox means.

Downloading movies from torrent websites is illegal, but people still do it. Many of these indexers offer real TV shows and films, so it's very easy for attackers to slip in malware, especially under the guis]]></description><link>https://www.bitdefender.com/en-au/blog/hotforsecurity/fake-mission-impossible-lumma-stealer-torrent</link><guid isPermaLink="false">6830830aa2cf20baf7a3add7</guid><category><![CDATA[Threats]]></category><dc:creator>Silviu STAHIE</dc:creator><pubDate>Fri, 23 May 2025 14:28:39 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2025/05/movie-theater-2093264_1920.jpg" medium="image"/><content:encoded><![CDATA[Mission: Impossible – The Final Reckoning is now in theaters, and many of the publicly available peer-to-peer sharing websites are already offering the movie as a download. Public interest in such a blockbuster gives cyberattackers a way to serve dangerous malware through unorthodox means.

Downloading movies from torrent websites is illegal, but people still do it. Many of these indexers offer real TV shows and films, so it's very easy for attackers to slip in malware, especially under the guis]]></content:encoded></item></channel>
        </rss>