The attack consists of a NexShield malicious browser extension, a social engineering technique to crash the browser, and a ...
North Korean hackers abuse Visual Studio Code task files in fake job projects to deploy backdoors, spyware, and crypto miners ...
CERT-UA reports PLUGGYAPE malware attacks targeting Ukrainian defense forces via Signal and WhatsApp, using phishing links ...
New WhatsApp Web attack spreads self-propagating ZIP files containing Astaroth banking malware through trusted conversations.
The good news is that not clicking on unknown links avoids it entirely.
A phishing campaign targeting carefully selected “high-value” corporate employees has been using LinkedIn direct messages to deliver weaponized downloads, highlighting how criminals are shifting away ...
Hackers are exploiting intentionally vulnerable penetration testing and security training apps that have been mistakenly exposed to the public internet, giving them access to cloud environments ...
The phishing campaign shows how attackers continue to weaponize legitimate cloud services and open source tools to evade ...
Artificial intelligence (AI) may have dominated wider tech headlines this year – and this held true in the cyber world as well – but at the same time, the security community’s concerns extend far ...
2026 text written on a blue flowing binary code background. New Year 2026 celebration concept. 2026 is a pivotal juncture for cybersecurity. What was once considered an operational safety net and a ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results