WhatsApp is refused right to intervene in Apple legal action on encryption ‘backdoors’
A court is to hear legal challenges against a secret order issued by the Home Office requiring Apple to give...
Read more →A court is to hear legal challenges against a secret order issued by the Home Office requiring Apple to give...
Read more →Kerberoasting is a common attack targeting Microsoft Active Directory, enabling attackers to compromise service accounts with low risk of detection....
Read more →Phishing attacks are evolving rapidly, allowing cybercriminals to bypass traditional security systems like email filters and static defenses. As a...
Read more →Lumma Stealer, a notorious information-stealing malware-as-a-service (MaaS) platform, has swiftly reemerged after a coordinated global law enforcement operation in May...
Read more →OpenAI is rolling out a new “personality” feature on the ChatGPT web app. This allows you to choose between multiple...
Read more →A fresh strain of the long-running macOS.ZuRu family has surfaced, hiding inside a doctored of the popular Termius SSH client...
Read more →Threat actors have deployed a malicious LNK file masquerading as a credit card company’s security email authentication pop-up to pilfer...
Read more →The Federal Bureau of Investigation (FBI), alongside the Cybersecurity and Infrastructure Security Agency (CISA), the Department of Health and Human...
Read more →Jul 23, 2025Ravie LakshmananMalware / Cryptocurrency The threat actor behind the exploitation of vulnerable Craft Content Management System (CMS) instances...
Read more →French Authorities confirm XSS.is admin arrested in Ukraine Pierluigi Paganini July 23, 2025 French authorities announced the arrest in Ukraine...
Read more →The global hacking campaign linked to the ToolShell vulnerability in Microsoft SharePoint has compromised hundreds of systems across the globe,...
Read more →Proton has launched a new tool called Lumo, offering a privacy-first AI assistant that does not log user conversations and...
Read more →