Cybercriminals are exploiting iCloud Calendar's invitation system to distribute fraudulent emails that appear to originate directly from Apple's official servers. [...]
VirusTotal's AI Code Insight feature has uncovered a previously undetected phishing operation that uses SVG image files to impersonate Colombia's [...]
Cybercriminals are actively exploiting a zero-day vulnerability in older Sitecore systems to install WeepSteel malware, a reconnaissance backdoor. This security [...]
Zscaler disclosed a security breach after attackers accessed its Salesforce environment through stolen OAuth and refresh tokens from Salesloft Drift, [...]
Cybercriminals are distributing the TamperedChef information-stealing malware by promoting a fake PDF editing tool called AppSuite PDF Editor through Google [...]
A newly discovered Android spyware, tracked as Android.Backdoor.916.origin, is masquerading as an antivirus allegedly from Russia’s Federal Security Service (FSB) [...]
A newly discovered Mac malware named Shamos is being spread through deceptive ClickFix attacks that disguise themselves as troubleshooting guides [...]
Microsoft is experimenting with a new Edge feature called Journeys, designed to transform browsing history into organized summaries. However, early [...]
A newly uncovered cyber-espionage campaign has been targeting foreign embassies in South Korea with the XenoRAT malware, delivered through malicious [...]
Cybercriminals are using the Japanese hiragana character "ん" to make malicious URLs look like legitimate Booking.com addresses, taking advantage of [...]
Security experts have uncovered a new malvertising campaign delivering PS1Bot, a modular malware framework capable of keylogging, data theft, reconnaissance, [...]
Two hackers, calling themselves "Saber" and "cyb0rg," allege they infiltrated the North Korean state-backed cyber group Kimsuky and released nearly [...]
Mozilla’s Firefox 141 introduced Smart Tab Grouping, an AI-powered tool designed to help users organize tabs locally without compromising privacy. [...]
Security researchers from Cisco Talos have uncovered five “ReVault” vulnerabilities in Dell’s ControlVault3 firmware and Windows APIs, affecting over 100 [...]
A hacker group has been exploiting trusted link-wrapping services from companies like Proofpoint and Intermedia to conceal phishing links targeting [...]
Microsoft has linked Chinese state-backed groups, Linen Typhoon and Violet Typhoon, to widespread attacks exploiting SharePoint vulnerabilities (CVE-2025-49706, CVE-2025-49704, and [...]
Cybersecurity experts have identified a new malware, MDifyLoader, used in attacks targeting Ivanti Connect Secure (ICS) appliances by exploiting two [...]