CBP Searched a Record Number of Phones at the US Border Over the Past Year
The recent spike in searches at the border has mostly been driven by an increase in the last six months. Between April and June this…
The recent spike in searches at the border has mostly been driven by an increase in the last six months. Between April and June this…
A newly advertised information-stealing malware called Anivia Stealer has surfaced on the dark web, with threat actor ZeroTrace aggressively promoting the C++17-based infostealer as a…
Around 70 countries have signed the new United Nations (UN) Convention against Cybercrime—the first global treaty designed to combat cybercrime through unified international rules and…
Over the past few years, the UK, US and other Western states have become comfortable calling out the actions of and applying sanctions to both…
Everest group claimed the hack of Sweden’s power grid operator Svenska kraftnät Pierluigi Paganini October 28, 2025 Hackers hit Sweden’s power grid operator Svenska kraftnät,…
A new Android malware family, Herodotus, uses random delay injection in its input routines to mimic human behavior on mobile devices and evade timing-based detection…
IPFire 2.29 Core Update 198 marks a significant advancement for users of this open-source firewall, introducing enhanced Intrusion Prevention System (IPS) capabilities powered by Suricata…
Security researchers have discovered a sophisticated phishing technique that weaponizes invisible Unicode characters embedded within email subject lines using MIME encoding—a tactic that remains largely…
A new data-stealing MALWARE called RedTiger is being used by cybercriminals to target gamers on the popular chat platform Discord. Cybersecurity firm Netskope reported this…
Nozomi Networks announced a cybersecurity solution designed to safely automate threat response in operational environments. With the latest release of Nozomi Arc, users gain automated…
Varonis Threat Labs is shining a spotlight on a decade-old vulnerability that opens the door to URL spoofing. By exploiting how browsers handle Right-to-Left (RTL)…
A sophisticated malware campaign targeting Brazilian users has emerged with alarming capabilities. The Water Saci campaign, identified by Trend Micro analysts as leveraging the SORVEPOTEL…