Researchers identified a new Osiris ransomware used in a November 2025 attack, abusing the POORTRY driver via BYOVD to disable…
Under Armour is investigating a data breach after 72M customer records were posted online by a cybercriminal. Under Armour is…
A new Android click-fraud trojan family uses TensorFlow ML to visually detect and tap ads, bypassing traditional script-based click techniques.…
Password manager LastPass warns of an active phishing campaign impersonating the service to steal users’ master passwords. LastPass warned users…
VoidLink is a cloud-focused Linux malware, likely built by one person using AI, offering loaders, implants, rootkit evasion, and modular…
Threat actors use PDFSIDER malware with social engineering and DLL sideloading to bypass AV/EDR, and ransomware gangs already abuse it.…
A Jordanian man pleaded guilty in the US to selling illegal access to 50 compromised enterprise networks after an undercover…
Major Telegram-based illicit marketplace Tudou Guarantee appears to be shutting down its operations, according to Elliptic. Blockchain cybersecurity firm Elliptic…
Ingram Micro says a ransomware attack exposed personal data of about 42,000 people, including names, birth dates, SSNs, and job-related…
Researchers uncovered an XSS flaw in StealC malware’s control panel, exposing key details about a threat actor using the info…
This website uses cookies.