Researchers at The Raven File have identified renewed activity from the HelloKitty ransomware, which now targets not...
Do Son
Cybercriminals are increasingly exploiting search engine optimization techniques to lure unsuspecting users to malicious websites. Both “black...
In December 2024, a closed-door meeting took place in Geneva between American and Chinese officials—an encounter that,...
The Moroccan National Social Security Agency (CNSS) is currently investigating a major breach of personal data, which,...
A recent investigation conducted by independent researcher John Tuckner has revealed that dozens of extensions exhibiting suspicious...
In Silicon Valley, unidentified individuals hacked several pedestrian crossings, replacing standard voice prompts with parodic imitations of...
Within the United States Cybersecurity and Infrastructure Security Agency (CISA), preparations are reportedly underway for sweeping personnel...
The threat group known as Paper Werewolf, also operating under the alias GOFFEE, has deployed a new...
Although the Trump administration recently clarified the scope of tariff exemptions—ensuring that products such as iPhones would...
According to a Bloomberg report, Netflix has integrated OpenAI’s artificial intelligence technology into the search functionality of...
Significant developments have been observed in the operations of the phishing platform Tycoon2FA, notorious for its ability...
Researchers have uncovered yet another large-scale cyberattack targeting FortiGate corporate VPN appliances—devices widely used by organizations to...
A cyberattack on the European operator of IKEA stores cost the company tens of millions of dollars....
Following a high-profile FBI raid earlier this year, the infamous hacker forum Cracked.io has resurfaced under a...
A new tool has emerged on the dark web for cybercriminals—Xanthorox AI, a system that boldly brands...