Hackers steal $8 million from users running trojanized BitKeep apps
Multiple BitKeep crypto wallet users reported that their wallets were emptied during Christmas after hackers triggered transactions that didn't require...
Multiple BitKeep crypto wallet users reported that their wallets were emptied during Christmas after hackers triggered transactions that didn't require...
A team of researchers has developed an eavesdropping attack for Android devices that can, to various degrees, recognize the caller's...
BTC.com, one of the world's largest cryptocurrency mining pools, announced it was the victim of a cyberattack that resulted in...
A threat actor claims to be selling public and private data of 400 million Twitter users scraped in 2021 using...
Yohei Ishihara, IoT security evangelist at Trend Micro, discussed the challenges CISOs facing within organizations driving industrial IoT. If you...
A new information-stealing malware named ‘RisePro’ is being distributed through fake cracks sites operated by the PrivateLoader pay-per-install (PPI) malware...
Hackers are actively targeting a critical flaw in YITH WooCommerce Gift Cards Premium, a WordPress plugin used on over 50,000...
Source: DALL-E The Irish Data Protection Commission (DPC) has launched an inquiry following last month's news reports of a massive Twitter...
Reports this week illustrate how threat actors consider Microsoft Exchange as a prime target for gaining initial access to corporate...
We analyze the latest changes in IcedID botnet from a campaign that abuses Google pay per click (PPC) ads to...
North Korea-linked threat actors have stolen an estimated $1.2 billion worth of cryptocurrency and other virtual assets in the past...
The data breach suffered by LastPass in August 2022 may have been more severe than previously thought.In August password management software...
Microsoft spotted an upgraded variant of the Zerobot botnet that spreads by exploiting Apache vulnerabilities.Microsoft Threat Intelligence Center (MSTIC) researchers...
A critical vulnerability in the Ghost CMS newsletter subscription system could allow external users to create newsletters or modify existing...
Leading sports betting company BetMGM disclosed a data breach after a threat actor stole personal information belonging to an undisclosed...
DuckDuckGo apps and extensions are now blocking Google Sign-in pop-ups on all its apps and browser extensions, removing what it...
LastPass revealed today that attackers stole customer vault data after breaching its cloud storage earlier this year using information stolen...
Introduction On July 17, 2022, Albanian news outlets reported a massive cyberattack that affected Albanian government e-services. A few weeks...
Microsoft spotted an upgraded variant of the Zerobot botnet that spreads by exploiting Apache vulnerabilities.Microsoft Threat Intelligence Center (MSTIC) researchers...
The Vice Society ransomware group has adopted new custom ransomware, with a strong encryption scheme, in recent intrusions.SentinelOne researchers discovered...
North Korea-linked threat actors have stolen an estimated $1.2 billion worth of cryptocurrency and other virtual assets in the past...
Highly destructive cybercrime is on the rise, and most of it is being funded with anonymous cryptocurrency. We review cryptocurrency...
Brave Software developers have created a new privacy-centric database query system called FrodoPIR that retrieves data from servers without disclosing the...
The Vice Society ransomware operation has switched to using a custom ransomware encrypt that implements a strong, hybrid encryption scheme...