News

In fact, RondoDox seems to be used for stealth proxies, hiding command-and-control (C2) traffic for even more malicious activities. It is also used to run layered scams, or to amplify DDoS-for-hire ...
It was discovered by Jeremiah Fowler, a cybersecurity researcher and analyst known for hunting for unencrypted and ...
Security researchers found a PDF app for Android sporting a banking trojan The trojan was introduced with a patch, six weeks ...
Atomic Stealer (AMOS), one of the most dangerous infostealer malware threats on the macOS ecosystem, just got a significant ...
CitrixBleed 2, a vulnerability in Citrix NetScaler ADC and NetScaler Gateway, is now being actively exploited in the wild, ...
The archive contained almost 26 million files, and it was later determined that most of the files were resumes and CVs ...
Ingram Micro, a global distributor of information technology (IT) products and services, has confirmed it suffered a ...
Security researchers from Elastic Security Labs found threat actors abusing Shellter Elite, the premium version of SHELLTER, to deploy infostealers and bypass modern antivirus and EDR defenses.
The vulnerabilities are tracked as CVE-2025-32462 (severity score 2.8/10 - low severity), and CVE-2025-32463 (severity score ...
In total, the campaign counted 352 Android apps, and during peak activity, it had 1.2 billion bid requests a day, the ...
A major ransomware operation has announced a complete shutdown and the public release of decryption keys - however, some are ...
Under the deal, Wix merchants will get access to Alibaba’s B2B marketplace by simply downloading the Alibaba Seller App ...