QR codes arrive via an age-old delivery system Switzerland's National Cyber Security Centre (NCSC) has issued an alert about ...
Android users take notice. The new and improved "FakeCall" malware convincingly hijacks bank phone calls and redirects them ...
A hacking group that is believed to be Chinese state-sponsored has compromised two websites with ties to the Tibetan ...
The Glove Stealer malware leverages a recently disclosed App-Bound encryption bypass method in attacks against browsers.
The report suggests that the malware is hiding within various gaming-related applications, such as speed boosters and ...
The vulnerability in question, CVE-2024-43451 (CVSS score: 6.5), refers to an NTLM hash disclosure spoofing vulnerability ...
A malware botnet is exploiting a zero-day vulnerability in end-of-life GeoVision devices to compromise and recruit them for likely DDoS or cryptomining attacks.
The attackers are using Google's Flutter platform to make malicious crypto apps that can ultimately grant remote access to a ...
North Korean Lazarus Group uses extended macOS file attributes to deliver RustyAttr malware to unsuspecting users ...
A new malicious package called 'SteelFox' mines for cryptocurrency and steals credit card data by using the "bring your own ...
Think "Stranger Things" on Netflix. The malware we’re talking about here is just like that. It’s called FakeCalls, and every time researchers figure out how it infects devices, it evolves with ...
BrazenBamboo exploits an unpatched FortiClient flaw to steal VPN credentials using DEEPDATA malware. Fortinet users advised ...