Lumma Stealer Targets Transportation Companies
Hackers appear targeting logistics and transportation companies in North America with Lumma…
DarkGate and Pikabot Copy the QakBot Malware
According to researchers, the phishing campaign promoting the DarkGate and PikaBot malware…
Phobos Ransomware Mimics VX-Underground Researchers
A new version of Phobos ransomware claims to be developed by VX-Underground,…
Reptar Vulnerability Threatens Intel Processors
Intel has fixed a serious Reptar vulnerability in various processors for desktops,…
Malicious CPU-Z Copy Is Spread In Google Search Ads
Attackers are again abusing the Google Ads platform to distribute malicious advertising…
North Korean Hackers Force US, Japan & South Korea Consultations
Increased activity by North Korean state hackers forced South Korea, the United…
Conti Members Are Back in Action as Part of Akira Ransomware
Experts are intestigating activity of the ransomware group Akira, which has compromised…
Google Is Working on an Information Security Project Called Web Integrity API
A team of four Google engineers is working on a new project…
Google Creates a Red Team to Attack AI Systems
Google says it is creating a red team that will specialize in…
Trojan HotRat Is Distributed through Pirated Versions of Software and Games
Avast experts have warned that a new variant of AsyncRAT malware, called…
Vulnerability in WordPress Plugin WooCommerce Payments Is Actively Used to Hack Sites
Hackers use a vulnerability in the widely used WooCommerce Payments WordPress plugin…
Hundreds of Military and Intelligence Agencies Uploaded Data to VirusTotal
An employee of the Google-owned platform VirusTotal accidentally uploaded a file with…