News

A sophisticated cyber‐espionage operation is exploiting Windows shortcut files disguised alongside seemingly genuine PDF newsletters to surreptiti ...
APK fraud is one of the fastest-growing cybercrime threats in the country today. These scams, driven by malicious Android Package Kit (APK) files, exploit public trust in digital systems while using ...
Impersonation of well-known brands remains a widespread tactic among cybercriminals, which increasingly affects internet ...
DLSS Swapper itself doesn't have this capability yet, although it will soon—possibly as soon as this Sunday. If you'd like to try it out yourself, it's quite possible, but you're going to have to do ...
State-sponsored hackers linked to the Mustang Panda activity cluster targeted diplomats by hijacking web traffic to redirect ...
Discover the one word you need to look out for when identifying a scam email, plus other red flags when it comes to phishing.
Opening your email or text messages can feel like wading through a minefield with all the scams that litter your inbox.
Silver Fox exploited a Microsoft-signed WatchDog driver in May 2025 to bypass defenses, deploy ValleyRAT, and enable fraud.
Threat actors have been using multiple websites promoted through Google ads to distribute a convincing PDF editing app that delivers an info-stealing malware called TamperedChef.
Nx supply chain attack on Aug 26, 2025 leaked 2,349 secrets via npm packages, risking GitHub and cloud accounts.
On August 26, 2025, Financial界 reported that the National Intellectual Property Administration's information shows that Shanghai Stock Exchange Information Network Co., Ltd. has applied for a patent ...
Cybercriminals abuse trusted Intel driver to gain kernel access and shut down Windows Defender, enabling undetected malware ...