Fake CAPTCHAs Target Users to Deploy Lumma Stealer RAT
HP's latest Threat Insights Report highlights a troubling rise in fake CAPTCHA attacks aimed at deploying the Lumma Stealer remote...
HP's latest Threat Insights Report highlights a troubling rise in fake CAPTCHA attacks aimed at deploying the Lumma Stealer remote...
Rooted devices pose a significant cybersecurity risk, being 250 times more vulnerable to compromise than standard devices, according to new...
A large-scale malicious app campaign is bypassing Android security, leading to over 60 million downloads of harmful applications from the...
A recent study reveals how GenAI tools can create information-stealing malware. This research, led by Vitaly Simonovich at Cato Networks,...
The ClickFix phishing scam is a sophisticated campaign targeting the hospitality industry by impersonating Booking.com. A sophisticated ClickFix phishing scam...
Chinese hackers have targeted Juniper routers by implanting backdoor malware, prompting organizations to upgrade their devices to maintain cybersecurity. According...
A significant cyber-attack campaign has emerged, targeting Colombian government institutions since November 2024. This campaign, attributed to the threat group...
The number of unauthorized Cobalt Strike copies has seen an impressive 80% drop thanks to intensified security efforts. Efforts to...
A significant surge in malicious software packages exploiting system vulnerabilities has raised alarm bells among cybersecurity experts. A rise in...
A Texas developer faces a potential decade-long prison sentence after being convicted of intentional damage to protected computers at his...
Discover the latest cyber-espionage campaign targeting UAE's aviation and transport, involving sophisticated malware and advanced techniques. A new cyber-espionage campaign...
A new phishing campaign is leveraging the open-source Havoc framework to stealthily control infected systems, heightening concerns about cyber threats....
The Winos 4.0 malware campaign is a significant threat to Taiwan, leveraging email impersonation tactics to target organizations effectively. A...
HaveIBeenPwned (HIBP) has significantly expanded its database, adding 244 million compromised passwords and 284 million email addresses sourced from infostealer...
The recent surge in cybersecurity threats highlights how hackers like Silver Fox are infiltrating healthcare networks, risking sensitive patient information....
Freelance developers are facing a serious threat as malicious ads are used to infiltrate their systems via GitHub. A recent...
Mustang Panda, a Chinese nation-state group, is strategically using Microsoft tools to evade ESET anti-virus protections. The Chinese nation-state group...
The emergence of FrigidStealer highlights that MacOS devices are now targets for malware, shattering the myth of their immunity. The...
A new variant of the Snake Keylogger is causing alarm among Windows users, as cybersecurity experts from Fortinet unveil its...
Explore how Telegram is being utilized as a command and control (C2) channel for a newly discovered Golang malware variant....
Microsoft has identified a new variant of the XCSSET malware targeting MacOS users, focusing primarily on Xcode projects. This sophisticated...
North Korea's latest campaign, named Operation Marstech Mayhem, aims to distribute crypto-stealing malware via open source components, significantly threatening crypto...
Researchers at Reversing Labs have unveiled two malicious AI models hosted on Hugging Face, highlighting a critical security concern related...
The BadIIS malware is a dangerous new threat targeting IIS servers, manipulating SEO to redirect users to illicit sites. A...