Cellebrite's zero-day exploit bypassed an Android lock screen to access a Serbian activist’s phone. Amnesty links attack to ...
Hackers now scan port 1098 to exploit RDP vulnerabilities, targeting 740,000 IPs daily. Microsoft patches two critical flaws.
Cybercriminals use fake CAPTCHAs in phishing PDFs to spread Lumma Stealer, targeting 7,000+ users via Webflow, GoDaddy, and ...
Microsoft identifies four cybercriminals behind Storm-2139, an AI abuse scheme exploiting Azure OpenAI services for illicit ...
Nearly 12,000 live secrets found in LLM training data, exposing AWS, Slack, and Mailchimp credentials—raising AI security ...
Sticky Werewolf deploys Lumma Stealer via phishing attacks in Russia and Belarus, stealing credentials, banking data, and ...
Winos 4.0 malware, deployed via phishing emails impersonating Taiwan’s tax authority, steals data through keylogging, ...
TgToxic malware evolves with advanced anti-analysis, DGA-based C2, and global expansion, targeting banking and crypto users ...
FBI confirms North Korea’s Lazarus Group stole $1.5B from Bybit, surpassing 2024’s total crypto heists. Investigations reveal ...
Organizations are either already adopting GenAI solutions, evaluating strategies for integrating these tools into their ...
Auto-Color Linux malware targets governments and universities, using stealth tactics and encryption to evade detection and ...
CERT-UA warns of UAC-0173 phishing deploying DCRat via Cloudflare R2, using RDP exploits, FIDDLER, and SENDMAIL to target ...