A phishing campaign is using a fake Google Account security page to deliver a web-based app capable of stealing one-time ...
Signed malware backed by a stolen EV certificate deployed legitimate RMM tools to gain persistent access inside enterprise ...
OAuth redirection is being repurposed as a phishing delivery path. Trusted authentication flows are weaponized to move users ...
Researchers have discovered the first known Android malware to use generative AI in its execution flow, using Google's Gemini ...
A compromised Chrome extension with 7,000 users was updated to deploy malware, strip security headers, and steal cryptocurrency wallet seed phrases.
One of the most overlooked vulnerabilities in the modern threat surface is the network layer. Every time you connect to the ...
If you use an Android phone, this deserves your attention. Cybersecurity researchers warn that hackers are using Hugging Face, a popular platform for sharing artificial intelligence (AI) tools, to ...
Malware can blend in with legitimate AI traffic, using popular AI tools as C2 infrastructure.
North Korean hacking group APT37 was seen deploying new implants, backdoors, and other tools in attacks targeting air-gapped ...
A new phishing campaign is impersonating Google’s account security checks to trick users into installing a malicious web app that steals passwords, passcodes, and other sensitive data directly from ...
Is that CAPTCHA you just encountered real? Find out how fake CAPTCHAs are installing hidden malware and how to stay safe.
Hackers hit more than 700 ATMs last year, resulting in $20 million worth of losses, the FBI says. The malware can instruct an ATM to dispense cash on demand, no bank card needed.