Cybercriminals are increasingly targeting WhatsApp accounts to impersonate victims and conduct fraudulent activities, such as emergency scams...
Credential Theft
Credential theft remains one of the most pervasive threats in cybersecurity, with Dark Reading reporting 11.3 million...
Recent reports highlight a significant shift in cyberattack strategies, with vulnerability exploitation and credential theft now accounting...
A newly documented proof-of-concept attack named “Cookie-Bite” demonstrates how malicious Chrome extensions can hijack browser session cookies...
Recent findings by the Socket Threat Research Team reveal a growing trend of threat actors uploading malicious...
A high-severity open redirect vulnerability (CVE-2025-24381) has been identified in Dell Unity storage systems running versions 5.4...
A threat actor has allegedly obtained and leaked approximately 10GB of stolen login credentials, posing a significant...
A sophisticated malware campaign dubbed “Arcane Stealer” is actively targeting gamers and VPN users through compromised YouTube...
The XE Group, a cybercrime syndicate with suspected Vietnamese origins, has dramatically evolved its operations from traditional...
Active Directory (AD) credential dumping remains a significant threat, with attackers increasingly exploiting overlooked attributes like user...
TrojanSpy.MSIL.REDLINESTEALER.YXBDN represents a sophisticated Windows-based information stealer with demonstrated capabilities in credential harvesting across multiple applications. First...
Multi-factor authentication (MFA) is a foundational security control, but attackers are increasingly bypassing it using MFA Push...
Check Point Research has uncovered a sophisticated phishing campaign leveraging Google Firebase to host fraudulent pages mimicking...
A critical vulnerability, CVE-2025-2609, has been identified in MagnusSolution’s MagnusBilling software, a widely used billing and call...