-
Researchers at Acronis have discovered a new campaign called Boto Cor-de-Rosa, where the Astaroth banking malware spreads like a worm through WhatsApp Web to steal contact lists and banking credentials.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Security researchers have identified two malicious Chrome extensions recording AI chats. Learn how to identify and remove these tools to protect your privacy.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Ilya Lichtenstein, the man behind the massive 2016 Bitfinex Bitcoin theft, has been released early from prison. Read how the First Step Act and a trail of Walmart gift cards led to this major update in one of the world’s largest crypto thefts.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Ledger confirms data breach via Global-e partner. Customer info exposed, phishing attacks active. No passwords or crypto recovery phrases leaked.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Phishing in 2026 is harder to detect and verify. Learn how CISOs can speed up investigations, reduce noise, and respond with confidence.
·
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Warning for EmEditor users: A third-party breach tampered with the official download link between Dec 19–22, 2025. Learn how to identify the fake installer and protect your data from infostealer malware.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Check Point researchers found a phishing scam abusing Google Cloud to target organisations worldwide. Scammers use official domains to steal logins. Read the full details in this exclusive report.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
US authorities have charged Zahid Hasan with running TechTreek, a $2.9 million online marketplace selling fake ID templates. The investigation, involving the FBI and Bangladesh police, uncovered a global scheme selling fraudulent passports and social s…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Amazon Security Chief explains how a subtle keyboard delay exposed a North Korean impostor. Read about the laptop farm scheme and how 110 milliseconds of lag ended a major corporate infiltration.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶


