Astaroth banking malware is spreading in Brazil through WhatsApp messages, using ZIP files to steal contacts and banking ...
Researchers at Zscaler ThreatLabz have found three malicious Bitcoin npm packages that are meant to implant malware named ...
A sophisticated malware known as Ghost Tap is now said to be behind a notable increase in fraudulent contactless payments.
Even with Apple’s locked-down design, iPhones in 2026 are not magically immune to malicious apps, scam pop-ups, or ...
The Glasgow Police Department urges anyone who believes they may have been targeted by a scam to report it to police.
Hackers abused Google Cloud email tools to send trusted phishing alerts that bypass filters and steal Microsoft logins ...
Black Cat cybercrime group used SEO poisoning and fake software downloads to infect nearly 278,000 systems in China with data ...
The packer plays a key role in initial access operations. Rather than delivering a single malware family, pkr_mtsi has been ...
More than 54 malicious APK samples have been identified, many disguised as legitimate financial or payment apps. Once ...
Cybercriminals use ErrTraffic tool to automate malware distribution through fake browser error messages, with attacks ...
The Windows Blue Screen (or Black Screen) of Death is typically a sign that some unrecoverable error or conflict has occurred. Now, cybercriminals are using the dreaded BSOD as a way to trick people ...