Phishing websites remain a persistent cybersecurity threat, exploiting users by imitating trusted online services. New ...
The campaign exploits an Office vulnerability to deliver the modular XWorm RAT, chaining HTA, PowerShell, and in-memory .NET execution to sidestep detection and expand post-compromise control.
A high-volume phishing campaign delivering the long-running Phorpiex malware has been observed using emails with the subject line "Your Document," a lure widely seen throughout 2024 and 2025. The ...
Some cybersecurity researchers say it’s too early to worry about AI-orchestrated cyberattacks. Others say it could already be happening.
North Korean hackers are running tailored campaigns using AI-generated video and the ClickFix technique to deliver malware for macOS and Windows to targets in the cryptocurrency sector.
The internet has changed how people work, shop, bank and stay in touch. Bills are paid online. Salaries are credited ...
A new open-source and cross-platform tool called Tirith can detect homoglyph attacks over command-line environments by ...
In 2024, creative platform Canva reported the discovery of three “CVE’s” (common vulnerabilities and exposures) in font files. The first had the potential to allow fonts to deliver a malicious XML ...
Microsoft has disclosed CVE-2026-0391, a UI spoofing vulnerability in Edge for Android that enables network attacks and ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results