The FBI has issued a public warning about a surge in NFT airdrop scams targeting users of...
Cyber Threats
Kerberos AS-REP roasting attacks have re-emerged as a significant threat to Active Directory environments, exploiting weak password...
A recent data breach at Coinbase has been traced to bribed customer support agents employed by outsourcing...
Two malicious RubyGems packages have been discovered masquerading as popular Fastlane CI/CD plugins, designed to intercept and...
Scattered Spider, a name that has dominated cybersecurity headlines since 2023, represents more than a traditional threat...
The escalating issue of mobile phone theft has sparked a contentious debate between technology companies like Apple...
Microsoft and CrowdStrike announced a joint initiative to create a unified reference system for tracking nation-state hacking...
The Federal Criminal Police Office of Germany (BKA) has publicly identified Vitaly Nikolaevich Kovalev, a 36-year-old Russian...
Threat actors are increasingly abusing Google Apps Script to host phishing pages, leveraging the platform’s trusted reputation...
The U.S. Treasury Department has imposed sanctions on Funnull Technology, a Philippines-based company accused of facilitating cyber...
Victoria’s Secret, the global lingerie retailer, took its U.S. website offline on May 28, 2025, following a...
The U.S. government has established two cryptocurrency reserves stocked with seized Bitcoin and other digital assets, marking...
Nvidia has reported staggering revenue growth in its Q1 2025 earnings, reaching $44.1 billion despite facing significant...
A newly discovered botnet named **PumaBot** is actively targeting Linux-based IoT devices by brute-forcing SSH credentials to...
Over 9,000 ASUS routers have been compromised by the “AyySSHush” botnet, which installs persistent SSH backdoors to...
A newly identified Russian cyberespionage group, tracked as Void Blizzard, has been connected to a September 2024...
The European Union has launched an investigation into Pornhub and three other adult content platforms over concerns...
Security researchers have identified 60 malicious packages in the NPM registry that collect sensitive host and network...
Apple’s continued resistance to manufacturing iPhones in the United States reflects deep structural challenges in global supply...
Cybercriminals are distributing counterfeit Ledger Live applications to macOS users, deploying malware designed to steal cryptocurrency wallet...