Report sheds more light on Phantom Stealer
Attacks involving the .NET-based Phantom Stealer, which has been bundled with a crypter and a remote access tool under the Phantom Project cybercrime kit, ha...
20 articles
Attacks involving the .NET-based Phantom Stealer, which has been bundled with a crypter and a remote access tool under the Phantom Project cybercrime kit, ha...
Suspected China-linked threat actors have weaponized a high-severity zero-day flaw in the TrueConf client video conferencing software, tracked as CVE-2026-35...
Widespread Microsoft 365 account compromise sought by Iran-linked hackers More than 300 organizations in Israel, over 25 others in the United Arab Emirates, ...
Cisco was reported to have had its source code stolen by threat actors following an attack linked to the recent supply chain attack against Aqua Security's T...
Threat operation TeamPCP, also known as PCPcat, DeadCatx3, and ShellForce, has tapped credentials siphoned from its sweeping supply chain attacks against Tri...
North Korean threat operation UNC1069 was noted by the Google Threat Intelligence Group to have perpetrated the npm supply chain attack against the widely us...
CrowdStrike and HCLTech have expanded their partnership with a new continuous threat exposure management service combining CrowdStrike's Falcon platform with...
Proton Meet utilizes the Messaging Layer Security (MLS) protocol for end-to-end encryption, ensuring that all media and chat are encrypted client-side.
Hostile actors, including state-linked entities, are leveraging artificial intelligence tools such as ChatGPT and other platforms to conduct cyber operations.
The incident at Mercor is believed to stem from malicious code injected into the LiteLLM project, an open-source tool used by numerous companies to manage AI...
A paper published by Google indicates that a quantum computer with 500,000 qubits could be used to steal cryptocurrency, a significantly lower threshold than...
The AI model, which has seen significant improvements since its beta phase, can now detect 14 times more ransomware infections at a faster rate.
The FCC has added all foreign-produced consumer-grade routers to its Covered List, prohibiting their marketing and sale in the U.S.
The FBI's public service announcement details how certain mobile apps may continuously collect user data, even when permissions are granted only for active use.
Vulnerabilities in the widely used Vim and GNU Emacs text editors, discovered with the assistance of the Claude AI, allow for remote code execution simply by...
The analysis, using MobSF, focused on app permissions, third-party trackers, hardcoded network endpoints, and developer emails.
The stealer persists on the victim’s machine and immediately exfiltrates data with no local staging.
Dating app OkCupid and its parent company Match Group Americas have reached a settlement with the Federal Trade Commission, following the latter's lawsuit th...