Hacker smiley face
04
Jun
2025

Hacker targets other hackers and gamers with backdoored GitHub code

A hacker targets other hackers, gamers, and researchers with exploits, bots, and game cheats in source code hosted on GitHub…

New Crocodilus Malware That Gain Complete Control of Android Device
04
Jun
2025

New Crocodilus Malware That Gain Complete Control of Android Device

A sophisticated new Android banking Trojan named Crocodilus has emerged as a significant global threat, demonstrating advanced device-takeover capabilities that…

DCRat Targets Latin American Users to Steal Banking Credentials
04
Jun
2025

DCRat Targets Latin American Users to Steal Banking Credentials

IBM X-Force has uncovered a series of targeted email campaigns orchestrated by Hive0131, a financially motivated threat group likely originating…

Hackers Leak 88 Million AT&T Records with Decrypted SSNs
04
Jun
2025

Hackers Leak 86 Million AT&T Records with Decrypted SSNs

Hackers have leaked what they claim is AT&T’s database which was reportedly stolen by the ShinyHunters group in April 2024…

Put ROCs before SOCs, Qualys tells public sector
04
Jun
2025

Put ROCs before SOCs, Qualys tells public sector

The security operations centre (SOC) has served public sector cyber teams well over the years but is fundamentally a reactive…

Tu-160 strategic bomber
04
Jun
2025

Ukraine claims it hacked Tupolev, Russia’s strategic warplane maker

The Main Intelligence Directorate (GUR) of Ukraine’s Ministry of Defense claims it hacked the Russian aerospace and defense company Tupolev,…

How To Detect Them Early 
04
Jun
2025

How To Detect Them Early 

Business Email Compromise (BEC) attacks don’t need malware to do damage. All it takes is one convincing message; a fake…

AMOS macOS Stealer Evades Security to Deploy Malicious Code
04
Jun
2025

AMOS macOS Stealer Evades Security to Deploy Malicious Code

A newly uncovered campaign involving an Atomic macOS Stealer (AMOS) variant has emerged, showcasing the evolving sophistication of multi-platform social…

BidenCash carding market domains seized in international operation
04
Jun
2025

BidenCash carding market domains seized in international operation

Earlier today, law enforcement seized multiple domains of BidenCash, the infamous dark web market for stolen credit cards, personal information,…

Threat Actors Exploit Malware Loaders to Circumvent Android 13+ Accessibility Safeguards
04
Jun
2025

Threat Actors Exploit Malware Loaders to Circumvent Android 13+ Accessibility Safeguards

Threat actors have successfully adapted to Google’s stringent accessibility restrictions introduced in Android 13 and later versions. These safeguards, rolled…

Investigatory powers: Guidelines for police and spies could also help businesses with AI
04
Jun
2025

Investigatory powers: Guidelines for police and spies could also help businesses with AI

Police and intelligence agencies are turning to AI to sift through vast amounts of data to identify security threats, potential…

Salesforce expands model lineup in support of agentic AI
04
Jun
2025

Hackers abuse malicious version of Salesforce tool for data theft, extortion

A financially motivated hacker group has been targeting Salesforce instances for months in a campaign that uses voice phishing to…