A Lithuanian national has been arrested for his alleged involvement in infecting 2.8 million systems with clipboard-stealing ...
A new ClickFix social engineering campaign is targeting the hospitality sector in Europe, using fake Windows Blue Screen of ...
The jsPDF library for generating PDF documents in JavaScript applications is vulnerable to a critical vulnerability that ...
Some stories, though, were more impactful or popular with our readers than others. This article explores 15 of the biggest ...
The WebRAT malware is now being distributed through GitHub repositories that claim to host proof-of-concept exploits for recently disclosed vulnerabilities. Previously spread through pirated software ...
OWASP's new Agentic AI Top 10 highlights real-world attacks already targeting autonomous AI systems, from goal hijacking to ...
A maximum severity vulnerability dubbed "Ni8mare" allows remote, unauthenticated attackers to take control over locally ...
The latest variant of the MacSync information stealer targeting macOS systems is delivered through a digitally signed, notarized Swift application. Security researchers at Apple device management ...
The Clop ransomware gang (also known as Cl0p) is targeting Internet-exposed Gladinet CentreStack file servers in a new data theft extortion campaign. Gladinet CentreStack enables businesses to ...
Two Chrome extensions in the Web Store named 'Phantom Shuttle' are posing as plugins for a proxy service to hijack user traffic and steal sensitive data. Both extensions are still present in Chrome's ...
The RansomHouse ransomware-as-a-service (RaaS) has recently upgraded its encryptor, switching from a relatively simple single-phase linear technique to a more complex, multi-layered method. In ...
Google is discontinuing its "dark web report" security tool, stating that it wants to focus on other tools it believes are more helpful. Google's dark web report tool is a security feature that ...