A hacker targets other hackers, gamers, and researchers with exploits, bots, and game cheats in source code hosted on GitHub…
A sophisticated new Android banking Trojan named Crocodilus has emerged as a significant global threat, demonstrating advanced device-takeover capabilities that…
IBM X-Force has uncovered a series of targeted email campaigns orchestrated by Hive0131, a financially motivated threat group likely originating…
Hackers have leaked what they claim is AT&T’s database which was reportedly stolen by the ShinyHunters group in April 2024…
The security operations centre (SOC) has served public sector cyber teams well over the years but is fundamentally a reactive…
The Main Intelligence Directorate (GUR) of Ukraine’s Ministry of Defense claims it hacked the Russian aerospace and defense company Tupolev,…
Business Email Compromise (BEC) attacks don’t need malware to do damage. All it takes is one convincing message; a fake…
A newly uncovered campaign involving an Atomic macOS Stealer (AMOS) variant has emerged, showcasing the evolving sophistication of multi-platform social…
Earlier today, law enforcement seized multiple domains of BidenCash, the infamous dark web market for stolen credit cards, personal information,…
Threat actors have successfully adapted to Google’s stringent accessibility restrictions introduced in Android 13 and later versions. These safeguards, rolled…
Police and intelligence agencies are turning to AI to sift through vast amounts of data to identify security threats, potential…
A financially motivated hacker group has been targeting Salesforce instances for months in a campaign that uses voice phishing to…











