Search Results For: attackers

Food retail giant Ahold Delhaize, parent company of well-known American brands like Food Lion, Stop & Shop, Giant Food, and Hannaford, has confirmed a significant data breach impacting over 2.24 million individuals. The incident, stemming from... Read more...
The long-held belief that MacBooks are impervious to malware has been overwhelmingly debunked, and that's probably stale by now. We've published several stories on malware infestations targeting macOS. The new story here, sedulously baked from... Read more...
It might be high time to rotate your least-changed passwords, if not all of them. The research team at Cybernews has been quietly tracking stolen credential datasets released this year, and the figures aren't good: a total of 16 billion records... Read more...
If you're like me, you spend part of your morning sifting through your inbox to separate the important stuff from the deluge of junk mail that fills it up each and every day (including Gmail accounts, despite Google's best efforts). Even with... Read more...
A newly disclosed Secure Boot vulnerability is putting a large number of PCs at risk of bootkit attacks, with security researchers urging immediate patching. The flaw, tracked as CVE-2025-3052, was uncovered by Binarly Research and involves a... Read more...
A few weeks ago, we reported on Google adding a privacy feature that helps users remove personal information from search engines. To further protect users' personal information, Google has patched a vulnerability that allows attackers to... Read more...
A new variant of the BADBOX malware campaign has taken root in over a million Android-based devices worldwide, and if youve picked up a cheap smart TV box or projector off Amazon or AliExpress lately, you might be part of the problem. BADBOX... Read more...
Crocodilus, a relatively new banking trojan targeting Android devices, is continuing to evolve since it was first spotted back in March by the Mobile Threat Intelligence team at Threat Fabric. The improvements aim to make the malware harder to... Read more...
Heads up if you have an Asus router in your home or office, as there's a backdoor exploit doing the rounds affecting 9,000 devices and counting. This event came to light by way of the security firm GreyNoise and its Sift AI tool that spotted... Read more...
It might surprise you to learn this, but cybercriminals are usually fairly protective of the data they steal, because things like credentials and login details have value, and can be sold to the right buyer. That's why it's so unusual that this... Read more...
A recent campaign by 3AM ransomware actors found the team using more proactive techniques rather than simple opportunistic hacks by pretending to be IT support. Using a combination of email bombing and spoof IT support calls, unwitting... Read more...
Yet another user info database has been leaked, which has unfortunately become a common occurrence in this day and age, no matter how much tech users and security professionals curse the cloud. This time around, it was the well-known and... Read more...
In a disturbing revelation that highlights the evolving nature of cyber threats, a YouTuber uncovered a significant security lapse where a printer manufacturer inadvertently distributed malware-laced software to its customers for at least six... Read more...
If you're a Chrome user, take note that the Cybersecurity and Infrastructure Security Agency (CISA) has identified and reported three zero-day vulnerabilities, and one of these flaws could affect you. The CISA reported that CVE-2025-4664 is... Read more...
Intel is once again in the crosshairs of a fresh speculative execution exploit, this time dubbed "Branch Privilege Injection." The new vulnerability, revealed by researchers at ETH Zurich's COMSEC group, is capable of extracting sensitive... Read more...
Nefarious hackers have figured out many ways to circumvent 2FA restrictions and harvest passwords with sophisticated phishing traps. Many of these bad actors, however, will soon be looking for new ways to attack Microsoft user accounts... Read more...
Apple has released iOS 18.4.1 and iPadOS 18.4.1, which fixes two security flaws that impact the Return Pointer Authentication Code (RPAC) and CoreAudio. This update fixes somezero-day vulnerabilities that are already being actively exploited in... Read more...
A recent report of a highly sophisticated phishing attack exploiting Google services targeting a lead developer at Ethereum Foundation, Nick Johnson, proves that internet users need to take more precautions to protect themselves from social... Read more...
A few weeks ago, we reported a study alleging that CAPTCHA does not deter bots and that Google merely uses it to collect and sell data. This week, HP Wolf Security researchers have launched a new complaint against CAPTCHA in the latest edition... Read more...
Bitdefender reports that more than 60 million users have recently downloaded applications used in massive ad fraud campaigns from the Play Store. The fraud campaign, code-named "Vapor," allows attackers to lure users into downloading... Read more...
You probably have experienced situations where you needed to convert files from one format to another. In these cases, free online file converters are a common solution. However, the FBI Denver Field Office has just taken to X (formerly... Read more...
This month's Microsoft Patch Tuesday is here and it's a big one. Last monthfixed 63 vulnerabilities. This month's update, however, includes patches for another 57 security vulnerabilities, six of which are already being actively exploited by... Read more...
1 2 3 4 5 Next