Security firm Arctic Wolf attributed the espionage campaign to UNC6384 (aka Mustang Panda, Twill Typhoon), and in research ...
Abstract: The rapid advancement of AI technologies has significantly increased the demand for AI models across various industries. While model sharing reduces costs and fosters innovation, it also ...
Cybersecurity never stops—and neither do hackers. While you wrapped up last week, new attacks were already underway. From hidden software bugs to massive DDoS attacks and new ransomware tricks, this ...
A Vietnamese threat group known as BatShadow is behind a cyberattack campaign that targets job seekers and digital marketing professionals by impersonating recruiters. This campaign distributes ...
A newly patched security flaw impacting Broadcom VMware Tools and VMware Aria Operations has been exploited in the wild as a zero-day since mid-October 2024 by a threat actor called UNC5174, according ...
We trust Macs to be reliable, secure and mostly resistant to viruses. Apple's software reputation has long been built around the idea that macOS is harder to compromise than Windows. And while there ...
New versions of the XWorm backdoor are being distributed in phishing campaigns after the original developer, XCoder, abandoned the project last year. The latest variants, XWorm 6.0, 6.4, and 6.5, ...
Hackers are using the WhatsApp messaging platform in an ongoing campaign to infect Windows computers across Brazil, researchers have found. The malware, dubbed Sorvepotel, spreads through phishing ...
Cybercriminals continue to find new ways to target social media users, and Meta accounts remain one of the most common lures. Losing access to Facebook or Instagram can have real consequences for both ...
A new Android banking and remote access trojan (RAT) dubbed Klopatra disguised as an IPTV and VPN app has infected more than 3,000 devices across Europe. Klopatra is described as a powerful trojan ...