News

North Korean cyber spies created two businesses in the U.S., in violation of Treasury sanctions, to infect developers working ...
The Security Alliance is putting out an alert for high profile users to be aware of a new crime group that is using Zoom to ...
New Mandiant research claims cybercriminals are increasingly financially motivated The Finance industry is the top target for ...
Google is rolling out an end-to-end encrypted email feature for business customers, but it could spawn phishing attacks, ...
New sophisticated phishing emails could look exactly like the login page of an email when the link is clicked. Security experts told the ABC7 I-Team they are so convincing that even well-trained users ...
Hackers are breaking into Japanese online brokerage accounts and using them to push up the prices of penny shares around the ...
A new Android malware has been discovered hidden inside trojanized versions of the Alpine Quest mapping app, which is ...
A hacking group dubbed 'Elusive Comet' targets cryptocurrency users in social engineering attacks that exploit Zoom's remote ...
404 Media writes that after it filed a Freedom of Information Act (FOIA) request about the tools, the bureau sent back a ...
The Proton66 network, SpiderLabs says, also hosted multiple command-and-control (C&C) servers, some of which were associated with the WeaXor ransomware (a variant of the Mallox malware). Related: US ...
Proton66-hosted IPs launched global cyberattacks since Jan 8, 2025, exploiting critical CVEs to deploy malware.
Infected USB flash drives can spread malware among multiple organizations in ways that can easily bypass traditional security ...