Researchers have discovered the first known Android malware to use generative AI in its execution flow, using Google's Gemini ...
A critical vulnerability in Grandstream GXP1600 series VoIP phones allows a remote, unauthenticated attacker to gain root privileges and silently eavesdrop on communications.
Google says that through 2025, it blocked more than 255,000 Android apps from obtaining excessive access to sensitive user ...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) ordered government agencies to patch their systems within ...
Infostealer dumps increasingly tie stolen credentials to real identities, linking usernames, cookies, and behavior across personal and enterprise accounts. Specops explains how analyzing 90,000 dumps ...
A Nigerian national was sentenced to eight years in prison for hacking multiple tax preparation firms in Massachusetts and filing fraudulent tax returns seeking over $8.1 million in refunds.
Texas sued networking giant TP-Link Systems, accusing the company of deceptively marketing its routers as secure while allowing Chinese state-backed hackers to exploit firmware vulnerabilities and ...
Threat actors are targeting technology, manufacturing, and financial organizations in campaigns that combine device code phishing and voice phishing (vishing) to abuse the OAuth 2.0 Device ...
African authorities arrested 651 suspects and recovered over $4.3 million in a joint operation targeting investment fraud, mobile money scams, and fake loan applications.
A newly identified Android banking trojan named Massiv has been under active distribution across south Europe, disguised as an IPTV app.
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is warning of a critical vulnerability in multiple Honeywell CCTV products that allows unauthorized access to feeds or account ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results