Fake CS2 tournament streams used to steal crypto, Steam accounts
Threat actors are exploiting major Counter-Strike 2 (CS2) competitions, like IEM Katowice 2025 and PGL Cluj-Napoca 2025, to defraud gamers...
Read more →Threat actors are exploiting major Counter-Strike 2 (CS2) competitions, like IEM Katowice 2025 and PGL Cluj-Napoca 2025, to defraud gamers...
Read more →An ongoing PayPal email scam exploits the platform’s address settings to send fake purchase notifications, tricking users into granting remote...
Read more →Google continues its rollout of gradually disabling uBlock Origin and other Manifest V2-based extensions in the Chrome web browser as...
Read more →An Android malware app called SpyLend has been downloaded over 100,000 times from Google Play, where it masqueraded as a...
Read more →Apple will no longer offer iCloud end-to-end encryption in the United Kingdom after the government requested a backdoor to access...
Read more →Cryptocurrency exchange Bybit revealed today that an unknown attacker stole over $1.46 billion worth of cryptocurrency from one of its...
Read more →The U.S. Cybersecurity & Infrastructure Security Agency (CISA) warns that a Craft CMS remote code execution flaw is being exploited...
Read more →An unknown leaker has released what they claim to be an archive of internal Matrix chat logs belonging to the...
Read more →Security researchers at Apiiro have released two free, open-source tools designed to detect and block malicious code before they are...
Read more →Health Net Federal Services (HNFS) and its parent company, Centene Corporation, have agreed to pay $11,253,400 to settle allegations that...
Read more →The Chinese state-sponsored Salt Typhoon hacking group uses a custom utility called JumbledPath to stealthily monitor network traffic and potentially...
Read more →Artificial intelligence (AI) is the simulation of human intelligence in machines, enabling systems to learn from data, recognize patterns, and...
Read more →