Security specialists have unearthed a group of Android VPN apps that surreptitiously convert user devices into proxy...
Security Advisory
Cybercriminals leverage 2FA (Two-Factor Authentication) phishing kits to bypass the added security layer provided by 2FA. These...
A malvertising campaign distributing a fake PuTTY client has been discovered, aiming to deploy the dangerous Rhadamanthys...
Mozilla has swiftly responded to two zero-day vulnerabilities exploited during the recent Pwn2Own Vancouver 2024 hacking contest...
First identified in 2020, the Sysrv botnet leverages a Golang worm to infect devices, deploying cryptominers through...