Malicious apps designed to steal cryptocurrency have made their way into Apple’s App Store and Google Play, marking the first known case of such malware successfully bypassing Apple’s strict security review process. According to cybersecurity firm Kaspersky, which first reported the findings,
Latest News
Meta has confirmed a zero-click spyware attack on WhatsApp that targeted around 90 journalists and civil society members across more than two dozen countries. The breach, detected in December 2024, involved spyware from Israeli firm Paragon Solutions, delivered via a malicious PDF file in WhatsApp
The Identity Theft Resource Center (ITRC) reported 3,158 data compromises in 2024, just 44 incidents shy of 2023’s record high. While the total number of breaches remained nearly unchanged, victim notices surged 312% to 1.7 billion, driven largely by 6 mega-breaches that each affected at least 100
In the ever-evolving landscape of cybersecurity, the integration of generative AI has become a pivotal point of discussion. To delve deeper into this groundbreaking technology and its impact on cybersecurity, we turn to renowned cybersecurity expert Jeremiah Fowler. In this exclusive Q&A
NordVPN has launched a new protocol called NordWhisper, designed to help bypass network restrictions that typically block VPN connections. The company announced that the protocol will allow for a smoother and more reliable browsing experience in environments where traditional VPNs are often
TalkTalk, a major UK telecom provider, is investigating a data breach involving the potential theft of personal information belonging to millions of its customers. The breach reportedly originated from a third-party supplier's system and was discovered on January 21. A hacker operating under the
Chinese artificial intelligence startup DeepSeek has reported a "large-scale malicious attack" on its services, forcing the company to temporarily halt new user registrations. The attack coincided with the rapid rise of DeepSeek’s AI assistant app, which recently surpassed ChatGPT as the most
A newly discovered vulnerability in Cloudflare's Content Delivery Network (CDN) allows attackers to approximate a user’s location simply by sending them an image. Security researcher Daniel, just 15 years old, identified the issue, which exploits how Cloudflare caches content across its global
President Donald Trump has signed the “Restoring Freedom of Speech and Ending Federal Censorship” executive order on January 20, 2025. This directive aims to curtail federal government involvement in content moderation and promote transparency regarding past censorship practices. The order takes
Ransomware gangs have recently begun posing as tech support to infiltrate networks and carry out malicious activities. These groups have been exploiting Microsoft services and tools, such as Microsoft Teams, for initial access and subsequent attacks. Security experts warn that this evolving