-
Cybercriminals are now increasingly using Telegram to sell corporate access, malware subscriptions, and stealer logs, turning the messaging app into a fast cybercrime hub.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Hackers abuse the .arpa Top-Level Domain to host phishing scams, using IPv6 tunnels, reverse DNS tricks, and shadow domains to bypass security checks.
·
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Europol’s Project Compass targets The Com (aka 764 network), an online group exploiting minors. After 30 arrests, officials say the hunt for those involved is far from over.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Hackers took over Iran’s BadeSaba Calendar prayer app, sending “Help Is on the Way” alerts and messages urging soldiers to lay down weapons.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Fake Zoom and Google Meet pages trick users into installing a monitoring software on Windows systems through phishing links and fake updates.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Major Pakistani TV channels, including Geo News and ARY News, were hit by a coordinated cyberattack on 1 March 2026. Hackers took control of live satellite feeds to display unauthorised messages. Read more about the breach, the regional impact, and the…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Fake Xeno and Roblox gaming tools are spreading a Windows RAT (remote access trojan) using PowerShell and LOLBins, Microsoft Threat Intelligence warns.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Stop the 75% failure rate. Learn which device vulnerabilities stall deployments and the exact fixes that get IoT projects to production.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
ShinyHunters hackers leak 2 million records from Dutch telecom Odido after ransom refusal, claiming up to 21 million customer records were stolen in the breach.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Is your AI assistant safe? Oasis Security researchers have found a critical ClawJacked vulnerability in OpenClaw that allows hackers to hijack AI agents through a simple browser tab.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶


