Iran-linked Dust Specter targeted Iraqi officials using fake ministry lures and new malware families uncovered by Zscaler.
Trojanized gaming tools and new Windows RATs like Steaelite enable data theft, ransomware, and persistent remote control.
This week, Cisco patches and hacks. Trojanized app targeted Israelis. Bye-bye, Tycoon 2FA. Also bye-bye LeakBase. A ...
1don MSN
US and EU police shut down LeakBase, a site accused of sharing stolen passwords and hacking tools
Authorities say LeakBase was "one of the world’s largest online forums for cybercriminals," and maintained an archive of ...
Security researchers say exploits used by governments to hack into Apple iPhones have been found used by cybercriminals. They ...
Posing as cybercriminals, investigators shut down a platform that fueled more than 30 million bogus emails in a single month, they say.
Hackers are abusing the legitimate OAuth redirection mechanism to bypass phishing protections in email and browsers to take ...
A 22-year-old Alabama man pleaded guilty to extortion, cyberstalking, and computer fraud charges after hijacking the social media accounts of hundreds of young women (including minors).
Signed malware backed by a stolen EV certificate deployed legitimate RMM tools to gain persistent access inside enterprise ...
An OpenClaw vulnerability allowed malicious websites to take over AI agents, exposing sensitive information and enabling data theft.
Hardware Today I learned Motorola was once developing a password pill that turns your body into an authentication token: 'We have demoed this working and authenticating a phone' Memory Many consumer ...
AI is helping cybercriminals to rapidly assemble malware with flat-pack efficiency. It’s almost like buying a sofa from Ikea, ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results