-
A sophisticated malware campaign targeting cryptocurrency traders has been uncovered by Socket’s Threat Research Team, revealing a malicious Chrome extension designed to steal MEXC exchange API credentials and enable unauthorized account control….
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A new experimental tool called InvisibleJS has emerged on GitHub, demonstrating how JavaScript source code can be completely hidden from human view while remaining fully executable. Created by developer oscarmine, this proof-of-concept obfuscation tech…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Web3 and cryptocurrency developers are facing a new wave of targeted attacks driven not by cold outreach, but by carefully engineered “inbound” traps. Instead of chasing victims through phishing emails or unsolicited Telegram messages, threat actors ar…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Instagram has dismissed security breach concerns, clarifying that recent unexpected password reset emails were caused by an external party exploiting a now-patched vulnerability rather than a complete system compromise. The social media giant confirmed…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
New Delhi, January 12, 2026 – India has emerged as the world’s top target for mobile attacks yet again, recording a steep 38% year-over-year increase in mobile threats, according to the India findings of the Zscaler ThreatLabz 2025 Mobile, IoT, and OT …
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Google has announced a major upgrade to Gmail, bringing its advanced Gemini AI directly into the email platform. The integration transforms Gmail into a personal, proactive inbox assistant designed to help users manage the ever-increasing volume of ema…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
The scam industry has undergone massive transformations over the past decade. The cliché image of the once-iconic Nigerian prince duping Westerners from a local cybercafé is now obsolete. One of the key drivers fueling the ongoing sha zhu pan (pig butc…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A security researcher has published proof-of-concept code for a critical authentication bypass vulnerability in the Atarim WordPress plugin that could allow attackers to steal sensitive user data and system configuration details. The flaw, tracked as C…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Illicit cryptocurrency transactions reached unprecedented levels in 2025 as nation-states weaponized digital assets to evade sanctions, transforming the cybercrime landscape into a geopolitical battleground with record-breaking financial volumes. Accor…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A newly disclosed vulnerability in Apache Struts 2’s XWork component could expose sensitive data and open the door to denial‑of‑service and server‑side request forgery (SSRF) attacks if left unpatched. The flaw, tracked as CVE-2025-68493, is rated Impo…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶


