News
The deceptive websites include detailed elements like image carousels with screenshots of the alleged apps in question, ...
North Korea's Lazarus Group expanded a malicious campaign of uploading malicious code to the JavaScript runtime environment ...
Malicious npm package targets wallet addresses in Atomic and Exodus, stealing crypto through fake PDF tool downloads.
Friday about a targeted cyberattack campaign aimed at Taiwanese. Hackers are reportedly disguising Trojan malware as the desktop version of the Line messaging app to lure users into downloading ...
North Korean actors used 11 npm packages downloaded 5,600+ times to spread BeaverTail malware, expanding attacks to Bitbucket.
A newly observed Android malware campaign has been observed leveraging deceptive websites hosted on recently registered ...
Developers using Microsoft’s Visual Studio Code (VSCode) editor are being warned to delete, or at least stay away from, 10 ...
Once installed, SpyNote requests an array of intrusive permissions, including access to SMS, contacts, call logs, camera, ...
Ukraine's malware-equipped drones are disrupting warfare, blending cyber tactics with physical tools, and reshaping global drone security.
Despite its age, the ClickFix method remains a popular tool in the arsenal of cybercriminals. Security researchers from ...
To demonstrate compliance, the AI Act allows providers to rely on a “ Code of Practice ”, currently being drafted by over 1000 stakeholders under the auspices of the AI Office, and expected to be ...
SpyNote malware disguised as Chrome installs hidden APKs via fake Play Store pages, stealing sensitive Android data.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results