More

    Exploits

    New Chinese Nexus APT Group Targeting Organizations to Deploy NET-STAR Malware Suite

    China-linked advanced persistent threat (APT) group Phantom Taurus has intensified espionage operations against government and telecommunications targets across Africa, the Middle East, and Asia,...

    Google Debuts New Ransomware Protection: 5 Things To Know

    Google unveiled what it’s calling a new approach to combating ransomware Tuesday, with the debut of AI-powered capabilities in Drive that aim to halt...

    Acronis brings patch management to consumer backup software

    Acronis announced the general availability of Acronis True Image 2026, the new release of its natively integrated backup and security software for consumers and...

    New Android Trojan “Datzbro” Tricking Elderly with AI-Generated Facebook Travel Events

    Cybersecurity researchers have flagged a previously undocumented Android banking trojan called Datzbro that can conduct device takeover (DTO) attacks and perform fraudulent transactions by...

    CERT-In Warns of Shai Hulud Malware in JavaScript npm system

    CERT-In has issued an advisory warning of Shai-Hulud malware that targets JavaScript’s Node Package Manager (npm) ecosystem 

    Hackers Trick Users Into Downloading Weaponized Microsoft Teams to Gain Remote Access

    Cybercriminals distribute fake Microsoft Teams installers through malicious ads to deploy Oyster backdoor malware, targeting enterprise collaboration software users. Cybersecurity researchers have identified a sophisticated...

    The Rise Of AI-Powered Ransomware: The Need To Adapt.

    Ransomware has always been more than a technical risk—it’s a business, a weapon, and a psychological warfare tool. In my previous Forbes article titled...

    Fake TradingView Premium ad campaign spreads to Google Ads, YouTube

    The campaign, which originated on Facebook, leverages compromised brand accounts. 

    Lone None hackers push global scam using Telegram bots and spoofed law firms to drop cryptostealing malware through fake archives

    Image Credit: Pixabay (Image credit: Geralt / Pixabay) Cybercriminals exploit copyright fear to push malware into everyday online spaces Telegram bots now double as command hubs for...

    Latest articles