Search Results For: attackers
by
Tim Sweezy - Tue, May 12, 2026
The May 2026 report from Googles Threat Intelligence Group marks a definitive shift in the cybersecurity landscape. While previous assessments categorized AI-assisted cyberattacks as experimental, current data from Mandiant and Gemini...
Read more...
by
Chris Harper - Fri, May 08, 2026
Discovery of the Copy Fail Linux kernel exploit sparked widespread discussion and concern around Linux kernel security earlier this month, and that was for an exploit that had mostly already been patched by the time the public was made...
Read more...
by
Chris Harper - Thu, Apr 30, 2026
It's not often thata major vulnerabilityis found in the Linux kernel, but when it does happen, it demands attention. Such is the case with "Copy Fail", which has just been found and disclosed by researchers at Xint Code. The good news is...
Read more...
by
Alan Velasco - Tue, Apr 21, 2026
Threat actors are getting more creative whendistributing their malware as users become better educated and platforms introduce policy changes to better prevent scams. New malware, however, has been uncovered by the researchers at security...
Read more...
by
Chris Harper - Fri, Apr 17, 2026
A cyber security expert that goes by the name Nightmare-Eclipse attempted to disclose three zero day exploits to Microsoft, but the first attempt went so poorly, he elected to release it into the wild. That first exploit was dubbed...
Read more...
by
Zak Killian - Wed, Apr 15, 2026
If you've ever tried to click the "back" button on your browser only to find yourself trapped in a loop or redirected to a sketchy spam page, relief is finally on the way. Google has announced that it is expanding its Search spam policies...
Read more...
by
Alan Velasco - Mon, Apr 13, 2026
A new malware campaign has been uncovered by the security researchers at Malwarebytes Labs, which steals sensitive and personal information from unsuspecting Windows users. It has proven to be an effective attack thanks to both how this...
Read more...
by
Zak Killian - Fri, Apr 10, 2026
If you downloaded common system tools CPU-Z or HWMonitor in the last 24 hours, stop reading this and go deal with that system first, because there's a real chance it was compromised. A breach of the official site for these tools resulted...
Read more...
by
Alan Velasco - Mon, Mar 23, 2026
Its a never-ending game of cat and mouse between attackers and software makers, with the latest salvo being fired against one of Google Chromes key security features. Security researchers at Gen Threat Labs have discovered that a...
Read more...
by
Alan Velasco - Thu, Mar 12, 2026
The security researchers at Kaspersky have detailed a new malware campaign targeting Android users, which aims to take over a victims device to abscond with user data while simultaneously putting it work mining cryptocurrencies. This new...
Read more...
by
Aaron Leong - Wed, Mar 04, 2026
A sophisticated iPhone hacking toolkit, suspected to have originated within U.S. government-linked development circles, has surfaced in the wild as a weapon used by both foreign intelligence services and opportunistic cybercriminals. It's...
Read more...
by
Chris Harper - Tue, Mar 03, 2026
Even in the world of cyber-criminals, there are some targets that simply won't earn you any admiration. One such case is a cyber attack involving the University of Hawaii's Cancer Center Epidemiology Division, with the data targeted...
Read more...
by
Alan Velasco - Tue, Mar 03, 2026
The National Consumers League has released its annual fraud report detailing the many scams that most consumers have fallen for. As you'd expect, AI is playing a large role in how the threat landscape has evolvedthis past year.While the...
Read more...
by
Chris Harper - Fri, Feb 27, 2026
AirSnitch is a newly-revealed attack on Wi-Fi networks that work across all major router brands and firmwares, including DD-WRT and OpenWrt. In an alarming turn for cybersecurity, researchers revealed a form of Wi-Fi attack that can...
Read more...
by
Chris Harper - Mon, Feb 23, 2026
iOS users may already be aware of the commercial spyware dubbed Predator, but may not know exactly what it's capable. Fortunately, malware researchers Nir Avraham and Hu Ke have published a detailed write-up on how the Predator spyware...
Read more...
by
Chris Harper - Fri, Feb 20, 2026
PayPal just disclosed a data breach that exposed sensitive user information, including social security numbers. From July 1st, 2025 to December 12th, 2025, a software glitch in PayPal Working Capital (PPWC) loan applications allowed...
Read more...
by
Alan Velasco - Thu, Feb 19, 2026
Cybersecurity professionals at Threat Fabric have uncovered a campaign utilizing a new piece of malicious software to target Android users. Massiv, a banking trojan, is described by the security researchers as a new Device Takeover malware...
Read more...
by
Paul Lilly - Mon, Feb 16, 2026
Attention all Chrome users, Google is rolling out an emergency patch to address a high-severity zero-day security flaw in the world's most popular browser (by market share), and it's not one you want to ignore. That is because Google...
Read more...
by
Alan Velasco - Tue, Feb 10, 2026
Researchers at the security firm iVerify have discovered a new piece of malware dubbed ZeroDayRAT, which can be used to compromise both Android and iOS devices. The company describes it as a complete mobile compromise toolkit typically...
Read more...
by
Chris Harper - Wed, Jan 28, 2026
Remember the WinRAR path handling exploit we reported on back in August? According to Google, that same flaw, officially dubbed CVE-2025-8088, is still being actively exploited, even though versions of WinRAR newer than v7.12 have been...
Read more...
by
Aaron Leong - Mon, Jan 26, 2026
Beware, a sneaky new variation of the homogaph phishing method is proving yet again that what you see isn't always what you get. Cybercriminals are using a nearly invisible typographical trick to impersonate Microsoft and Marriott websites...
Read more...
by
Chris Harper - Fri, Jan 16, 2026
Users of Bluetooth accessories bewarea vulnerability was found in the commonly-used Google Fast Pair standard in August of 2025, and an active exploit dubbed WhisperPair is out in the wild. The WhisperPair exploit allows for...
Read more...