Cybercrime

Australian Man Sentenced for Wi-Fi Attacks at Airports
Malware & Threats Australian Man Sentenced for Wi-Fi Attacks at Airports

Have you ever connected to free airport Wi-Fi without a second thought, trusting it to keep you linked to the world while waiting for your flight? What if that seemingly harmless connection was a trap, designed to steal your most personal data? In a chilling case from Australia, a 44-year-old man

How Did ShadyPanda Turn Browser Extensions Into Spyware?
Malware & Threats How Did ShadyPanda Turn Browser Extensions Into Spyware?

Imagine installing a simple browser extension to jazz up your desktop with wallpapers, only to discover later that it’s been secretly tracking every click, search, and scroll. This isn’t a far-fetched nightmare but the reality for over 4.3 million users affected by a covert cyber threat known as

Will ScadaBR XSS in CISA’s KEV Fuel Cloud-Scale ICS Attacks?
Malware & Threats Will ScadaBR XSS in CISA’s KEV Fuel Cloud-Scale ICS Attacks?

KEV Meets the Plant Network: Why a ScadaBR XSS Entry Changes the Risk Calculus Now When a settings page on a familiar HMI can deliver scripted deception, disable alarms, and rewrite operator assumptions in a single click, the debate about “web-only” risk in industrial networks stops sounding

CISA Flags Spyware Hitting Messaging Apps, Updates Guidance
Malware & Threats CISA Flags Spyware Hitting Messaging Apps, Updates Guidance

Why Messaging Apps Are in the Crosshairs—and Why CISA Is Speaking Up Now When a government agency breaks routine to warn about spyware burrowing into everyday chats, the signal is clear: attackers see messaging apps as the shortest route to the heart of a phone’s data and trust. Researchers across

Okta Study: Phishing Persists Despite Advanced Defenses
Malware & Threats Okta Study: Phishing Persists Despite Advanced Defenses

Lead Monthaftermonththecountofenterprisestrippedbyphishingneverhitszeroeveninmatureprograms. Even as authentication hardens and detection stacks converge, attackers keep finding ways to coax users into handing over what tech alone cannot fully guard: trust. The result is a steady pulse of

ShadowRay 2.0 Vulnerability – Review
Malware & Threats ShadowRay 2.0 Vulnerability – Review

In a landscape where artificial intelligence drives innovation across industries, a staggering statistic emerges: nearly 230,000 Ray framework environments are exposed to the internet, ripe for exploitation. This open-source tool, pivotal for orchestrating AI workloads, has become a prime target

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later