Fake Vpn Chrome Extensions Force Installed 15 Million Times
Three malicious Chrome extensions posing as VPN (Virtual Private Networks) infected were downloaded 1.5 million times, acting as browser hijackers,...
Three malicious Chrome extensions posing as VPN (Virtual Private Networks) infected were downloaded 1.5 million times, acting as browser hijackers,...
Europol has notified over 400 websites that their online shops have been hacked with malicious scripts that steal debit and...
Mint Mobile has disclosed a new data breach that exposed the personal information of its customers, including data that can...
Earlier this month, the BlackCat/ALPHV ransomware operation suffered a five-day disruption to their Tor data leak and negotiation sites, rumored...
Ubisoft is investigating whether it suffered a breach after images of the company's internal software and developer tools were leaked...
Today, the Akira ransomware gang claimed that it breached the network of Nissan Australia, the Australian division of Japanese car...
A new Python project called 'Wall of Flippers' detects Bluetooth spam attacks launched by Flipper Zero and Android devices. By...
Indian government entities and the defense sector have been targeted by a phishing campaign that's engineered to drop Rust-based malware...
A vulnerability has been identified in Microsoft Edge. A remote attacker could exploit this vulnerability to trigger remote code execution...
UK telco EE has warned customers they could be deluged with millions of scam SMS messages on December 23 as...
The UK’s secretary of state for justice has warned of a “clear and present danger” to British democracy from deepfakes...
Security researchers have discovered a new series of “crypto drainer” malware attacks that have stolen $59m from victims so far...
Threat hunters have discovered a rogue WordPress plugin that's capable of creating bogus administrator users and injecting malicious JavaScript code...
A new phishing campaign is leveraging decoy Microsoft Word documents as bait to deliver a backdoor written in the Nim...
Organizations in the Defense Industrial Base (DIB) sector are in the crosshairs of an Iranian threat actor as part of...
A vulnerability has been identified in Microsoft Edge. A remote attacker could exploit this vulnerability to trigger remote code execution...
Attackers are weaponizing an old Microsoft Office vulnerability as part of phishing campaigns to distribute a strain of malware called...
Cybersecurity researchers have discovered an updated version of an Android banking malware called Chameleon that has expanded its targeting to...
John Hanley of IBM Security shares 4 key findings from the highly acclaimed annual Cost of a Data Breach Report...
A new analysis of the sophisticated commercial spyware called Predator has revealed that its ability to persist between reboots is...
The threat actor known as UAC-0099 has been linked to continued attacks aimed at Ukraine, some of which leverage a...
The BidenCash stolen credit card marketplace is giving away 1.9 million credit cards for free via its store to promote...
The Chameleon Android banking trojan has re-emerged with a new version that uses a tricky technique to take over devices...
OpenAI has mitigated a data exfiltration bug in ChatGPT that could potentially leak conversation details to an external URL. According...