A massive ad fraud operation dubbed ‘Vastflux’ that spoofed more than 1,700 applications from 120 publishers, mostly for iOS, has been…
Blog
Threat actors now use OneNote attachments in phishing emails that infect victims with remote access malware which can be used…
The Roaming Mantis malware distribution campaign has updated its Android malware to include a DNS changer that modifies DNS settings…
A new Android malware named ‘Hook’ is being sold by cybercriminals, boasting it can remotely take over mobile devices in…
Hackers are setting up fake websites for popular free and open-source software to promote malicious downloads through advertisements in Google…
A New York resident has pleaded guilty to charges of conspiracy to commit bank fraud using stolen credit cards purchased…
With deeper penetration of the Internet across India, online scams are increasingly becoming commonplace. We have seen OTP scams, UPI…
Git has patched two critical severity security vulnerabilities that could allow attackers to execute arbitrary code after successfully exploiting heap-based…
Proof-of-concept exploit code will be released later this week for a critical vulnerability allowing remote code execution (RCE) without authentication…
A threat actor has uploaded to the PyPI (Python Package Index) repository three malicious packages that carry code to drop info-stealing…