Technology

FBI and Europol destroy the Lumma Stealer malware network linked to 10 million infections

The vast operations carried out by a consortium of global law enforcement…

7 Min Read

Fake Kling AI Facebook ads deliver rat malware to over 22 million potential victims

Fake Facebook pages and sponsored ads on social media platforms are being…

5 Min Read

Russian hackers exploit email and VPN vulnerabilities to spy on Ukrainian Aid Logistics

Russian cyberthreat actors have been attributed to state-sponsored campaigns targeting western logistics…

5 Min Read

Purerat Malware Spikes 4X will deploy PureLogs to target Russian companies in 2025

According to new Kaspersky surveys, Russian organizations have become targets for phishing…

3 Min Read

Google Chrome now allows you to automatically change compromised passwords using the built-in manager

Google has announced a new feature in the Chrome browser. This will…

2 Min Read

AWS default IAM role is known to allow for lateral movement and cross-service exploitation

Cybersecurity researchers have discovered the dangerous default identity and access management (IAM)…

5 Min Read

Hazy Hawk Exploites DNS Records hijack CDC to hijack CDC, the corporate domain for malware delivery

Threat actor known as Haze Hawk By leveraging false mining in domain…

5 Min Read

Why are AI chatbots often psychophonic?

Do you imagine things, or do artificial intelligence (AI) chatbots seem too…

10 Min Read

Over 100 fake Chrome extensions found hijacking sessions, credential stealing, ad injections

The unknown threat actor has been equipped with seemingly benign utility since…

3 Min Read