ESET researchers provide a comprehensive analysis and assessment of a critical severity vulnerability with low likelihood of ...
Hackers are deploying fake reCAPTCHA pop-ups to install Amatera Stealer malware, targeting crypto wallets and browser data. eSentire reports the rise of ClickFix-powered attacks delivering Amatera and ...
In mid-October 2025, a cyberattack targeted a major U.S.-based real estate company utilizing the recently developed Tuoni command-and-control framework. The intruders employed social engineering ...
North Korea-linked Contagious Interview campaign is now luring developers with trojanized coding tasks and pulling obfuscated payloads from public JSON-storage services like JSON Keeper, JSONSilo, and ...
This special report analyses the voter turnout in the second phase of Bihar's 2024 Lok Sabha elections, where constituencies including Kishanganj, Katihar, Purnia, Bhagalpur, and Banka went to the ...
Cybersecurity researchers have disclosed a new set of three extensions associated with the GlassWorm campaign, indicating continued attempts on part of threat actors to target the Visual Studio Code ...
AI malware may be in the early stages of development, but it’s already being detected in cyberattacks, according to new research published this week. Google researchers looked at five AI-enabled ...
Google has discovered a new breed of AI-powered malware that uses large language models (LLMs) during execution to dynamically generate malicious scripts and evade detection. A Google Threat ...
Security researchers have uncovered a "highly capable" new mobile banking Trojan targeting Android users in Indonesia and possibly across other Southeast Asian countries. Like many Android banking ...
A sophisticated Android malware operation known as GhostBat RAT is targeting Indian users by impersonating official Regional Transport Office (RTO) applications, including the mParivahan app, ...