FBI and Europol destroy the Lumma Stealer malware network linked to 10 million infections
The vast operations carried out by a consortium of global law enforcement…
7 Min Read
Fake Kling AI Facebook ads deliver rat malware to over 22 million potential victims
Fake Facebook pages and sponsored ads on social media platforms are being…
5 Min Read
Russian hackers exploit email and VPN vulnerabilities to spy on Ukrainian Aid Logistics
Russian cyberthreat actors have been attributed to state-sponsored campaigns targeting western logistics…
5 Min Read
Purerat Malware Spikes 4X will deploy PureLogs to target Russian companies in 2025
According to new Kaspersky surveys, Russian organizations have become targets for phishing…
3 Min Read
Google Chrome now allows you to automatically change compromised passwords using the built-in manager
Google has announced a new feature in the Chrome browser. This will…
2 Min Read
AWS default IAM role is known to allow for lateral movement and cross-service exploitation
Cybersecurity researchers have discovered the dangerous default identity and access management (IAM)…
5 Min Read
Hazy Hawk Exploites DNS Records hijack CDC to hijack CDC, the corporate domain for malware delivery
Threat actor known as Haze Hawk By leveraging false mining in domain…
5 Min Read
Why are AI chatbots often psychophonic?
Do you imagine things, or do artificial intelligence (AI) chatbots seem too…
10 Min Read
Over 100 fake Chrome extensions found hijacking sessions, credential stealing, ad injections
The unknown threat actor has been equipped with seemingly benign utility since…
3 Min Read