Cybercriminals have devised a novel technique to conceal malicious code within Android applications, rendering it nearly impervious...
Security
Trend Micro has uncovered a new campaign orchestrated by the threat group Water Gamayun, in which adversaries...
Troy Hunt, the renowned cybersecurity blogger and creator of the popular service “Have I Been Pwned” (HIBP),...
One of South Africa’s largest agro-industrial corporations, Astral Foods, has confirmed that it fell victim to a...
Credential stuffing remains one of the most prevalent and effective methods of unauthorized access. By leveraging databases...
Signal President Meredith Whittaker came to the defense of the messaging platform following a recent incident involving...
The computer disruptions that afflicted Kuala Lumpur International Airport over the past weekend were the result of...
In early 2025, researchers at Silent Push uncovered a new phishing campaign targeting Counter-Strike 2 players, distinguished...
Cybereason has released a new analytical report examining the operations of the PlayBoy Locker Ransomware-as-a-Service (RaaS) platform....
On March 25, the DeFi platform Abracadabra Finance suffered a large-scale cyberattack, resulting in the theft of...
Today, most antivirus and EDR systems monitor which commands are executed within a system. These security solutions...
A newly discovered zero-day vulnerability in Windows enables threat actors to steal users’ NTLM hashes simply by...
A new menace has emerged on the cybercrime landscape — the VanHelsing operation, built on the Ransomware-as-a-Service...
Researchers at Trend Micro have uncovered new variants of the Albabat ransomware, which now targets not only...
The BlackLock group is rapidly emerging as a dominant force among ransomware operators employing the RaaS (Ransomware-as-a-Service)...