News

Most were removed from the Play Store, but according to BleepingComputer, “many of them continue to be available”. Although ...
In fact, RondoDox seems to be used for stealth proxies, hiding command-and-control (C2) traffic for even more malicious activities. It is also used to run layered scams, or to amplify DDoS-for-hire ...
It was discovered by Jeremiah Fowler, a cybersecurity researcher and analyst known for hunting for unencrypted and ...
Security researchers found a PDF app for Android sporting a banking trojan The trojan was introduced with a patch, six weeks ...
Wix users now get to use some of the most popular fonts in the world, such as Helvetica, or Avenir, thanks to a new partnership with Monotype Imaging. Earlier this week, the popular website builder ...
Atomic Stealer (AMOS), one of the most dangerous infostealer malware threats on the macOS ecosystem, just got a significant ...
CitrixBleed 2, a vulnerability in Citrix NetScaler ADC and NetScaler Gateway, is now being actively exploited in the wild, ...
The archive contained almost 26 million files, and it was later determined that most of the files were resumes and CVs ...
Ingram Micro, a global distributor of information technology (IT) products and services, has confirmed it suffered a ...
Security researchers from Elastic Security Labs found threat actors abusing Shellter Elite, the premium version of SHELLTER, to deploy infostealers and bypass modern antivirus and EDR defenses.
The vulnerabilities are tracked as CVE-2025-32462 (severity score 2.8/10 - low severity), and CVE-2025-32463 (severity score ...
A cybercriminal is threatening to release more than 100GB of sensitive data stolen from Spanish telecommunications giant ...