A hacking group that is believed to be Chinese state-sponsored has compromised two websites with ties to the Tibetan ...
Malware is the scary boogeyman of computers, supposedly capable of destroying everything you know and love. But what does it ...
Swiss citizens warned about fake ‘Alertswiss app’ Malicious app deploys a variant of the Coper trojan Keystrokes, 2FA codes ...
New Glove Stealer information-stealing malware can bypass Google Chrome's Application-Bound (App-Bound) encryption to steal ...
The DeepData malware framework was seen exploiting a Fortinet VPN client for Windows zero-day that remains unpatched.
The Chinese state-sponsored hacking group Volt Typhoon has begun to rebuild its "KV-Botnet" malware botnet after it was ...
The AI-based features are rolling out to Pixel 6 or newer first but will soon be expanded to other Android devices, Google ...
The Glove Stealer malware leverages a recently disclosed App-Bound encryption bypass method in attacks against browsers.
Security researchers have discovered that malicious actors have been using ZIP file concatenation to avoid the detection of ...
New revelations about Israeli NSO Group’s use of Pegasus malware expose serious breaches of privacy, impacting journalists, ...
The report from Group-IB concerns the discovery of RustyAttr, a brand new piece of macOS malware built using the Tauri ...
The vulnerability in question, CVE-2024-43451 (CVSS score: 6.5), refers to an NTLM hash disclosure spoofing vulnerability that could be exploited to steal a user's NTLMv2 hash. It was patched by ...