News

Noodlophile stealer targets enterprises via copyright phishing since 2024, using Gmail, Dropbox, and Telegram for evasion.
PipeMagic is a plugin-based modular malware that uses a domain hosted on the Microsoft Azure cloud provider to stage the ...
Cybersecurity isn’t breaking in one big hack—it’s bleeding out in dozens of new threats this week: NFC trojans, live exploits ...
PyPI malware termncolor and colorinal downloaded 884 times exploit DLL side-loading, persistence, and C2 communication.
Deepfake CFO scam stole $25.6M via fake video calls, proving adversarial AI is redefining identity fraud risks.
1Password Device Trust is one example of a zero trust solution that blocks a device from authenticating to company SaaS apps ...
The tools designed to accelerate innovation are degrading application security by embedding subtle yet serious vulnerabilities in software. Nearly half of the code snippets generated by five AI models ...
ERMAC was first documented by ThreatFabric in September 2021, detailing its ability to conduct overlay attacks against ...
EncryptHub exploits CVE-2025-26633 with social engineering and rogue MSC files, delivering Fickle Stealer malware.
UAT-7237 exploits unpatched Taiwan servers using SoundBill, Cobalt Strike, and SoftEther VPN for persistent control.
The vulnerability, assigned the CVE identifier CVE-2025-20265 (CVSS score: 10.0), affects the RADIUS subsystem implementation ...
Defend against PhantomCard, SpyBanker, and KernelSU exploits—secure banking, block NFC fraud, and stop Android malware today.