Security specialists have unearthed a group of Android VPN apps that surreptitiously convert user devices into proxy...
Malware
A malvertising campaign distributing a fake PuTTY client has been discovered, aiming to deploy the dangerous Rhadamanthys...
Security researchers have discovered a sophisticated method, named “DHCP Coerce,” that exploits the Dynamic Host Configuration Protocol...
Google has announced an upgrade to its Safe Browsing technology, enhancing Chrome users’ protection against phishing, malware,...
Hackers are using weaponized LNK files to deploy AutoIt malware, causing concern in the cybersecurity community. The...