New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images
A new version of SparkCat malware targets cryptocurrency users on mobile platforms, concealing itself in benign apps and evolving its technical capabilities.
New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images
A new version of SparkCat malware targets cryptocurrency users on mobile platforms, concealing itself in benign apps and evolving its technical capabilities.
Disconnected systems fueling title, wire fraud risks
Disconnected systems, inconsistent definitions of data, and the manual nature of data movement create ongoing challenges in the title industry, according to FundingShield President Adam Chaudhary.
Autovista blames ransomware for service disruption
Autovista is addressing a ransomware infection affecting its systems in Europe and Australia, prioritizing the secure restoration of impacted applications.
Autovista blames ransomware for service disruption
Autovista is addressing a ransomware infection affecting its systems in Europe and Australia, prioritizing the secure restoration of impacted applications.
One year on from the M&S cyber attack: What did we learn? | Computer Weekly
Marks & Spencer experienced a significant cyber attack in April 2025, disrupting services and highlighting vulnerabilities in third-party tech suppliers.
Your tech support company runs scams. Stop-or disguise with more fraud?
Tech Live Connect processed fraudulent charges using real customer data, including names and addresses, to make the charges appear legitimate and maintain a low chargeback ratio.
Malicious WordPress Plugins with Backdoors Compromise Thousands of Websites
Malicious WordPress plugins with backdoors compromised thousands of websites, demonstrating a supply-chain attack and leading to their permanent removal.
European police email 75,000 people asking them to stop DDoS attacks | TechCrunch
A global law enforcement operation targeted over 75,000 alleged cybercriminals using DDoS-for-hire services, resulting in arrests and domain takedowns.
Malvertising has become the primary malware delivery vector globally, surpassing email and direct hacks, with AI enabling rapid distribution of adaptive malware across publishers.
Cyber criminals too are working from home... your home
The FBI warns that cybercriminals use residential proxies to mask illegal activities by hijacking IoT devices, smartphones, and routers, threatening both consumers and enterprises, particularly older devices.
100 Chrome Extensions Steal User Data, Create Backdoor
Over 20,000 users installed malicious Chrome extensions that steal information, provide backdoors, or inject ads, as reported by cybersecurity firm Socket.
GPT-5.4-Cyber aims to further embed AI in cybersecurity
OpenAI's GPT-5.4-Cyber enhances generative AI for cybersecurity, focusing on defensive applications and providing trusted users with advanced capabilities.
Ransomware scum, other crims exploit 4 old Microsoft bugs
Four Microsoft vulnerabilities are actively exploited, including one from 2012, prompting CISA to urge federal agencies to patch them within two weeks.
Hackers Use LinkedIn Messages to Spread RAT Malware Through DLL Sideloading
LinkedIn phishing uses malicious WinRAR SFX and DLL sideloading with a legitimate PDF reader to deploy a Python-based RAT executing Base64 shellcode in memory.
Attackers are targeting developers via Slack and Google Sites
A targeted phishing campaign exploits trust in the open-source community, tricking developers into providing credentials and installing malicious software.
Adobe patches vulnerability that steals data via PDFs
A sophisticated attack exploits a vulnerability in Adobe Reader via malicious PDF files to gather sensitive information and potentially execute arbitrary code.
Credential incidents cause significant operational costs and disruptions, impacting IT teams and overall business productivity beyond just breach prevention.
New Perseus Android Banking Malware Monitors Notes Apps to Extract Sensitive Data
Perseus, a new Android malware evolved from Cerberus and Phoenix, actively targets users through dropper apps for device takeover and financial fraud, with primary focus on Turkey and Italy.
Modern cyberattacks combine psychological manipulation, deepfakes, voice phishing, and stolen data to breach even well-defended organizations without exploiting software vulnerabilities.
Security Firm Executive Targeted in Sophisticated Phishing Attack
A C-level executive at Outpost24 was targeted by a sophisticated phishing attack using the Kratos phishing-as-a-service kit that exploited legitimate services like Cisco and Nylas to bypass security defenses.
Targeted Phishing Attack Breaches Biotech Company Data
Intuitive Surgical suffered a phishing attack compromising employee credentials, exposing customer and corporate data, though operational systems and customer networks remained unaffected due to network segmentation.
Security Firm Executive Targeted in Sophisticated Phishing Attack
A C-level executive at Outpost24 was targeted by a sophisticated phishing attack using the Kratos phishing-as-a-service kit that exploited legitimate services like Cisco and Nylas to bypass security defenses.
Targeted Phishing Attack Breaches Biotech Company Data
Intuitive Surgical suffered a phishing attack compromising employee credentials, exposing customer and corporate data, though operational systems and customer networks remained unaffected due to network segmentation.
Fake job applications pack malware that disables EDR
Russian cybercriminals target HR teams with malicious CVs disguised as job applications to install malware that disables security tools and steals corporate data.