The Contagious Interview campaign weaponizes job recruitment to target developers. Threat actors pose as recruiters from crypto and AI companies and deliver backdoors such as OtterCookie and ...
Storm-2561 uses SEO poisoning to push fake VPN downloads that install signed trojans and steal VPN credentials. Active since 2025, Storm-2561 mimics trusted brands and abuses legitimate services. This ...
Could steal sensitive personal and financial data After a whopper of a Patch Tuesday last month, with six Microsoft flaws exploited as zero-days, March didn't exactly roar in like a lion. Just two of ...
DirectX, the Microsoft technology that allows PC games to talk to your gaming hardware, is going to build in support for the ...
The financially motivated group has been active since May 2025, impersonating Fortinet, Ivanti, Cisco, and other vendors to steal corporate credentials.
From AI expansions and cyberattacks to billion-dollar deals and workforce shifts, here’s what defined the tech industry this ...
Hackers are pretending to be solving a spam problem but are actually deploying backdoors.
A new ClickFix attack variant uses fake CAPTCHA pages instructing victims to paste and execute malicious commands in Windows Terminal.
This week saw attacks on Claude Code users, LastPass users, Starlink users, and, perhaps worst of all, people who needed an ...
Thinner design and power from the Tensor G6 chip; Microsoft: Hackers use AI to impersonate IT employees, secretly attacking the company.
Fake OpenClaw installers on GitHub deployed credential stealers and a proxy tool linked to the Black Basta ransomware group, while Bing's AI served the malicious ...
This week, Russian hackers targeted Signal and WhatsApp users, permit-fee phishing hit U.S. applicants, ClickFix on WordPress ...