Crypto wallets received a record $158 billion in illicit funds last year
Illegal cryptocurrency flows reached a record $158 billion in 2025, reversing a three-year trend of declining amounts from $86B in 2021 to $64B in 2024.…
Illegal cryptocurrency flows reached a record $158 billion in 2025, reversing a three-year trend of declining amounts from $86B in 2021 to $64B in 2024.…
NVIDIA has released critical security updates for its GPU Display Drivers after discovering multiple high-severity vulnerabilities that could allow attackers to execute malicious code and…
A trio of domains that allegedly distributed pirated content, including movies, TV shows, video games and other content was seized by the U.S. government as…
Security researchers at Annex Security have uncovered a malicious VS Code extension in the Open VSX registry that masquerades as the popular Angular Language Service.…
Former Google software engineer Linwei Ding was found guilty of stealing over 2,000 pages of confidential AI trade secrets, after FBI and DoJ investigators traced…
The latest phase of the global law enforcement action resulted in seizing three industrial-scale illegal IPTV services. The operation, coordinated by Europol, Eurojust, and Interpol,…
A sophisticated traffic distribution system (TDS) hiding behind education-themed domains. The operation uses bulletproof hosting to deliver phishing pages, scams, and malware files. Analysts triaged…
Malcolm Jack wants you to understand that when it comes to cybersecurity, people are just as important as technology. Jack is the chief technology officer…
Microsoft announced that it will disable the 30-year-old NTLM authentication protocol by default in upcoming Windows releases due to security vulnerabilities that expose organizations to cyberattacks.…
A sneaky Android spyware called GhostChat, which tricks Pakistan-based users with romance scams via WhatsApp. The malware grabs sensitive data like contacts, photos, and files…
Subpostmasters who suffered at the hands of errors in the Post Office’s Capture software, like Horizon users, are receiving derisory compensation offers, but face a…
Listen to the article 3 min This audio is auto-generated. Please let us know if you have feedback. Dive Brief: The share of cyberattacks that…