An information stealer called VoidStealer has introduced a new technique to bypass Chrome's Application-Bound Encryption by leveraging hardware breakpoints to [...]
Threat actors are exploiting Microsoft Azure Monitor alerts to send fraudulent callback phishing emails impersonating the Microsoft Security Team. The [...]
WordPress.com has introduced new capabilities allowing AI agents to draft, edit, publish posts, manage comments, and organize website content through natural [...]
A sophisticated exploit framework called DarkSword has been actively targeting iPhones running iOS 18.4 through 18.7 since November 2025, stealing [...]
Apple has deployed its first Background Security Improvements update, addressing a WebKit vulnerability tracked as CVE-2026-20643 across iPhones, iPads, and [...]
Cybercriminals are targeting employees in financial and healthcare sectors through Microsoft Teams conversations, using Quick Assist remote access tools to [...]
Cybercriminals are exploiting the special-use .arpa domain and IPv6 reverse DNS mechanisms to launch phishing campaigns that evade traditional reputation-based [...]
Fraudulent OpenClaw installers hosted on GitHub and promoted through Microsoft Bing's AI-powered search results were found deploying information-stealing malware to [...]
A critical unauthenticated vulnerability in the FreeScout helpdesk platform enables attackers to achieve remote code execution simply by sending a [...]
Security researchers have identified PromptSpy, the first Android malware family that integrates generative AI directly into its operational flow. Discovered [...]
Security researchers have documented the first real-world instance of information-stealing malware targeting configuration files belonging to the popular OpenClaw AI [...]
Threat actors have developed an innovative ClickFix campaign that leverages DNS lookups to distribute malicious payloads, marking the first known [...]
A sophisticated campaign attributed to North Korean hackers is targeting JavaScript and Python developers through fake job interviews involving cryptocurrency-related [...]
Security researcher Wietze Beukema has unveiled four previously undocumented techniques that manipulate Windows shortcut files to conceal malicious payloads. These [...]
North Korean hackers are deploying advanced social engineering tactics combined with never-before-seen macOS malware strains to siphon cryptocurrency assets. The [...]
Hackers are actively exploiting critical vulnerabilities in SolarWinds Web Help Desk (WHD) to install legitimate administrative software for harmful purposes. [...]
Hackers are actively exploiting a severe flaw, designated CVE-2025-11953, in the React Native Metro development server. This vulnerability allows them [...]
Google's Threat Intelligence Group, in collaboration with industry partners, has disrupted the infrastructure of IPIDEA, one of the world's largest [...]
Two critical vulnerabilities in the popular open-source automation platform n8n allow authenticated attackers to escape its security sandbox and execute [...]
A new malware-as-a-service (MaaS) operation, dubbed "Stanley," is advertising the creation and publication of malicious Chrome extensions designed to bypass [...]