Cybercriminals are distributing the TamperedChef information-stealing malware by promoting a fake PDF editing tool called AppSuite PDF Editor through Google [...]
A newly discovered Android spyware, tracked as Android.Backdoor.916.origin, is masquerading as an antivirus allegedly from Russia’s Federal Security Service (FSB) [...]
A newly discovered Mac malware named Shamos is being spread through deceptive ClickFix attacks that disguise themselves as troubleshooting guides [...]
Microsoft is experimenting with a new Edge feature called Journeys, designed to transform browsing history into organized summaries. However, early [...]
A newly uncovered cyber-espionage campaign has been targeting foreign embassies in South Korea with the XenoRAT malware, delivered through malicious [...]
Cybercriminals are using the Japanese hiragana character "ん" to make malicious URLs look like legitimate Booking.com addresses, taking advantage of [...]
Security experts have uncovered a new malvertising campaign delivering PS1Bot, a modular malware framework capable of keylogging, data theft, reconnaissance, [...]
Two hackers, calling themselves "Saber" and "cyb0rg," allege they infiltrated the North Korean state-backed cyber group Kimsuky and released nearly [...]
Mozilla’s Firefox 141 introduced Smart Tab Grouping, an AI-powered tool designed to help users organize tabs locally without compromising privacy. [...]
Security researchers from Cisco Talos have uncovered five “ReVault” vulnerabilities in Dell’s ControlVault3 firmware and Windows APIs, affecting over 100 [...]
A new cyber threat campaign dubbed JSCEAL has been uncovered by Check Point Research, targeting cryptocurrency users through deceptive advertisements [...]
A hacker group has been exploiting trusted link-wrapping services from companies like Proofpoint and Intermedia to conceal phishing links targeting [...]
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has publicly launched Thorium, an open-source platform designed to support malware analysis [...]
Microsoft has linked Chinese state-backed groups, Linen Typhoon and Violet Typhoon, to widespread attacks exploiting SharePoint vulnerabilities (CVE-2025-49706, CVE-2025-49704, and [...]
Cybersecurity experts have identified a new malware, MDifyLoader, used in attacks targeting Ivanti Connect Secure (ICS) appliances by exploiting two [...]
Cybercriminals are leveraging ConnectWise ScreenConnect installers to spread remote access malware by manipulating hidden configuration data embedded in the file’s [...]