Cybersecurity News
Stay informed about the latest cybersecurity incidents, vulnerabilities, and threat landscape changes. We cover data breaches, ransomware campaigns, critical CVEs, and regulatory updates – with context on what it means for you and how to protect yourself.
Europol and International Law Enforcement Agencies Take Down Ghost Encrypted Communication Platform
In a significant victory against organized crime, Europol and law enforcement agencies from nine countries have successfully dismantled Ghost, a ...
Cybercriminals Leverage GitHub to Spread Malware Disguised as Popular Software
Cybersecurity researchers have uncovered an alarming trend in malware distribution tactics, with threat actors now exploiting GitHub as a platform ...
South Korean APT Group Exploits WPS Office Vulnerability to Deploy SpyGlace Backdoor
Cybersecurity researchers have uncovered a critical remote code execution vulnerability in Kingsoft WPS Office for Windows, which is being actively ...
Global Law Enforcement Operation Shuts Down Massive Phone Unlocking Scheme
In a significant blow to international cybercrime, law enforcement agencies have successfully dismantled a sophisticated criminal network that exploited the ...
Cybersecurity Alert: Sophisticated Malware Targets Yandex Browser in Failed Attack
In a recent cybersecurity incident, researchers at Dr.Web uncovered a sophisticated malware attack targeting a major Russian railway freight company. ...
Cybersecurity Experts Uncover Malicious Crypto App on Google Play Store
Cybersecurity researchers at Check Point have uncovered a sophisticated cryptocurrency theft operation masquerading as a legitimate Web3 tool on the ...
Kia Connect Security Flaws: How Hackers Could Remotely Control Cars
In a startling revelation, cybersecurity researchers have uncovered critical vulnerabilities in Kia’s dealer portal that could have allowed malicious actors ...
Necro Trojan Resurfaces in Google Play Store, Impacting Millions of Users
In a concerning development for Android users worldwide, cybersecurity experts have uncovered the presence of the Necro Trojan in two ...
Cybercriminals Leverage Email Autoreply to Spread Xmrig Crypto Miner
Cybersecurity experts at FACCT have uncovered a sophisticated attack vector utilizing email autoreply functions to distribute the Xmrig cryptocurrency miner. ...
Cybersecurity Alert: Infostealers Quickly Adapt to Bypass Chrome’s New App-Bound Encryption
In a concerning development for cybersecurity professionals and internet users alike, several infostealer malware variants have reportedly found ways to ...