More

    Exploits

    Watch out for this fake Windows BSOD

    Follow ZDNET: Add us as a preferred source on Google. ZDNET's key takeaways A new campaign creates a fake BSOD to install malware. The campaign tricks users into installing...

    Ghost Tap Malware Fuels Surge in Remote NFC Payment Fraud

    A new wave of Android malware has been enabling cybercriminals to carry out unauthorized tap-to-pay transactions without physical access to victims’ bank cards. The activity, documented...

    AI IDEs pushed fake extensions, posing malware risk, say researchers

    Koi Security claimed the unclaimed namespaces to prevent threat actors from doing the same. 

    How info-stealing malware quietly undermines security

    ao link Remember Login Register|Reset Password Remember Login Register|Reset Password Latest News07 Jan 2026 Not every cyber-attack announces itself with locked systems or public disruption – some of the most...

    Llm-powered Attacks Advance Android Malware Evasion, Achieving 97% Detection Bypass

    The increasing sophistication of Android malware presents a constant challenge to detection systems, prompting researchers to explore the vulnerabilities of machine learning-based defenses. Tianwei...

    Fake Booking.com emails and BSODs used to infect hospitality staff

    Suspected Russian attackers are targeting the hospitality sector with fake Booking.com emails and a fake “Blue Screen of Death” to deliver the DCRat malware. The...

    This new malware campaign is stealing chat logs via Chrome extensions

    (Image credit: Getty Images / champpixs) Share by: Share this article 0 Join the conversation Follow us Add us as a preferred source on Google Researchers warn of rising “prompt poaching,”...

    Cybercriminals Exploit Call Forwarding for Financial Fraud, I4C Warns

    A new cyber scam sees fraudsters tricking people into forwarding calls to steal bank OTPs and take over accounts. The I4C has warned citizens...

    Sedgwick Acknowledges Data Breach Linked to TridentLocker Ransomware Attack

    The breach underscores persistent vulnerabilities that federal contractors entrusted with critical U.S. government information face. 

    Latest articles