Google Threat Intelligence Releases New Details on UNC6040
Google Threat Intelligence Group has published new research on UNC6040, a financially motivated threat group specialising in voice phishing (vishing) campaigns. This group has been…
Google Threat Intelligence Group has published new research on UNC6040, a financially motivated threat group specialising in voice phishing (vishing) campaigns. This group has been…
Google’s AI advancement is not slowing down, and we might be getting yet another powerful model codenamed “Gemini Kingfall.” As spotted by users on X,…
A sophisticated phishing technique that exploits Microsoft Outlook‘s HTML rendering capabilities to hide malicious links from corporate security systems while maintaining their effectiveness against end…
OpenAI is planning to ship an update to ChatGPT that will turn on the new o3 Pro model, which has more compute to think harder.…
A critical vulnerability affecting its Identity Services Engine (ISE) when deployed on major cloud platforms, warning that proof-of-concept exploit code is now publicly available. The…
Image: Mark Rademaker, via Shutterstock. Ukraine has seen nearly one-fifth of its Internet space come under Russian control or sold to Internet address brokers since…
Federal authorities on Thursday said they seized $7.74 million from North Korean nationals as they attempted to launder cryptocurrency obtained by IT workers who gained…
Federal authorities have revealed that the notorious Play ransomware group has successfully breached approximately 900 organizations worldwide as of May 2025, marking a dramatic escalation…
Indirect carbon emissions from the operations of four of the leading AI-focused tech companies rose on average by 150 percent from 2020-2023, due to the…
U.S. CISA adds Google Chromium V8 flaw to its Known Exploited Vulnerabilities catalog Pierluigi Paganini June 05, 2025 U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds…
The FBI is warning that the BADBOX 2.0 malware campaign has infected over 1 million home Internet-connected devices, converting consumer electronics into residential proxies that are…
In the high-stakes world of cybercrime, few tools have garnered as much attention as Lumma Infostealer. Emerging as a powerful malware-as-a-service (MaaS) offering, Lumma achieved…