"The C2 hosts a web-based graphical user interface (GUI) titled 'NEXUS Listener' that can be used to view stolen information ...
CERT-UA impersonation on March 26–27, 2026 spread AGEWHEEZE malware, infecting few devices despite 1M phishing emails.
A new wave of device code phishing shows how threat actors are scaling account compromise using AI and end‑to‑end automation.
A class action lawsuit was filed in the U.S. District Court for the Northern District of California yesterday, alleging that ...
In a world where we’re all online in one way or another – banking, shopping, even our social communication – identity theft ...
Audit social media privacy, update software, manage app permissions, use password managers, enable advanced authentication, ...
The NDPC confirmed that the relevant parties and individuals have been providing information for the purpose of addressing the incident.The Nigeria Data Protection Commission (NDPC) has announced that ...
The NDPC confirmed that the relevant parties and individuals have been providing information for the purpose of addressing ...
The campaign is stealing credentials from unpatched servers at scale, due to “neglect and efficiency,” says analyst, and the ...
Three women who work at Oregon’s largest prison are suing the Department of Corrections for $1.5 million alleging colleagues have subjected them to sexual assault, unwanted sexual contact and ...
Windows has a zero-day vulnerability that allows attackers to escalate their privileges. A patch is not yet available.
The Irish crypto wallet was supposed to be a digital tomb. For ten years, 500 Bitcoin sat untouched, locked behind a ...