From late 2024 through the spring of 2025, the iVerify team documented a series of anomalous incidents...
Security
Following the April 2025 Windows security updates, users began to notice a curious anomaly — an empty...
Two malicious packages were recently discovered within the widely used JavaScript package registry, npm. Beneath their seemingly...
An increasing number of cybercriminals are shifting toward the use of so-called residential proxy networks, transforming ordinary...
As solar panels steadily become a fixture of daily life—enhancing energy resilience and reducing our carbon footprint—their...
A large-scale supply chain attack has been identified on the NPM platform: threat actors compromised 17 widely...
A newly modified strain of the Mirai botnet has weaponized the CVE-2024-3721 vulnerability found in TBK DVR-4104...
Operators of the Qilin ransomware group—also known under the alias Phantom Mantis—have begun actively exploiting critical vulnerabilities...
A new wave of cyberattacks has been recorded in Ukraine, targeting the destruction of critical infrastructure. At...
Even if you download applications exclusively from Google Play, this does not always guarantee safety—particularly when it...
At first glance, it appears to be nothing more than a routine security check. In reality, it...
New samples of PowerShell-based malware, representing an advanced evolution of the notorious data-stealer ViperSoftX, have begun circulating...
The critical vulnerability CVE-2025-49113, discovered in the widely used webmail platform Roundcube, found its way into the...
Analysts at Symantec have uncovered serious vulnerabilities in several widely used Google Chrome extensions, jeopardizing the privacy...
China has reportedly experienced what may be the most significant data breach in its history: approximately 4...