Trend Micro revealed hacker-for-hire Void Balaur group has been active since the mid-2010s and has claimed victims across sectors, while… Read More
Phishing attacks keep surfacing online with innovative ways to trick users. The latest phishing campaign… New Phishing Campaign Exploits Proofpoint’s… Read More
Researchers at Zimperium who discovered the campaign reported their findings to the US and South Korean authorities, but the host… Read More
The 'coa' library, short for Command-Option-Argument, receives about 9 million weekly downloads on npm, and is used by almost 5… Read More
The U.S. Secret Service confirmed that it has seen a “marked increase” in sham job ads seeking to steal people’s… Read More
Recently, researchers uncovered an email-based phishing scam containing QR codes in a bid to steal users’ Microsoft credentials and other… Read More
Attackers are looking for sneaky new ways to dupe victims into clicking links to phishing websites designed to look like… Read More
C.R.E.A.M. Finance is a decentralized lending protocol for individuals, institutions, and protocols to access financial services. It promises earnings to… Read More
Researchers have uncovered how critical vulnerabilities in the OpenSea marketplace allowed crypto thefts via malicious… OpenSea Vulnerabilities Allowed Malicious NFT… Read More
Academics from universities developed a new attack technique, dubbed SmashEx, that runs into Intel SGX and can allow adversaries to… Read More
The scenario that was presented to victims is that their accounts have been hacked, and so for reasons of safety,… Read More
The FBI warned the US public that threat actors actively use fake and spoofed unemployment benefit websites to harvest sensitive… Read More
An Android-based phishing campaign was observed targeting customers of telecommunication services based in Japan. The malware-laced fake app steals credentials… Read More
The bots are used to automatically call targets as a part of a phishing scam and lure them to giving… Read More
A now-patched critical vulnerability in OpenSea, the world's largest non-fungible token (NFT) marketplace, could've been abused by malicious actors to… Read More
A newly discovered data exfiltration mechanism employs Ethernet cables as a "transmitting antenna" to stealthily siphon highly-sensitive data from air-gapped… Read More