Multi-Source Journalism
This article synthesizes reporting from multiple credible news sources to provide comprehensive, balanced coverage.
Multi-Source Journalism
This article synthesizes reporting from multiple credible news sources to provide comprehensive, balanced coverage.
Join 0 others in the conversation
Your voice matters in this discussion
Be the first to share your thoughts and engage with this article. Your perspective matters!
Discover more articles
A new malware threat called Klopatra has emerged, disguising itself as a free VPN app to infect personal devices. The malicious app, Mobdro Pro IP VPN, poses as a legitimate IPTV service but actually surrenders control of the device to hackers, allow
New AI-powered web browsers, such as OpenAI's ChatGPT Atlas and Perplexity's Comet, are introducing web browsing AI agents that automate tasks, but these agents pose significant risks to user privacy, potentially surpassing those of traditional brows
Researchers have discovered a new tactic used by scammers, who are exploiting unsecured cellular routers in industrial settings to send mass phishing messages via SMS. These routers, often found in traffic lights and power meters, can be controlled r
A new malware threat called Klopatra has emerged, disguising itself as a free VPN app called Mobdro Pro IP VPN to infect personal devices. This is the latest example of a growing trend of malicious apps posing as free VPNs, which have become increasi
A sophisticated spyware campaign, codenamed "Landfall," has been uncovered targeting Samsung Galaxy phones, exploiting a previously unknown vulnerability in the Android software to steal personal data from users in the Middle East for nearly a year.
A sophisticated spyware campaign, codenamed "Landfall," has been uncovered targeting Samsung Galaxy phones in the Middle East, exploiting a previously unknown vulnerability in Android software to steal personal data for nearly a year. The attacks, wh
A new phishing-as-a-service platform called VoidProxy is targeting Microsoft 365 and Google accounts with sophisticated attacks that use automation, artificial intelligence-enhanced content, and disposable domains to evade detection. The platform's k
A potent credential stealer called Atomic Stealer is infiltrating Macs through deceptive ads on search engines, including Google and Bing. These fake ads impersonate popular online services such as LastPass, 1Password, and Dropbox to trick users into
Researchers have demonstrated the alarming effectiveness of AI-generated phishing emails in a recent experiment, where 11 out of 108 volunteers fell victim to malicious links crafted by popular chatbots. This highlights the growing threat of AI-power
A new malware threat called Klopatra has been identified by cybersecurity firm Cleafy, posing as a free VPN app called Mobdro Pro IP VPN to infect personal devices. This is the latest in a series of warnings about malware apps masquerading as free VP
A recent surge in 48-hour attacks by Chinese organized gangs has compromised millions of smartphone users in the Americas, with malicious texts claiming undelivered packages, unpaid fines, or security checks. These scams, driven by the notorious Smis
Researchers at Unit 42 have discovered a highly sophisticated commercial spyware, dubbed "Landfall," that targeted Samsung Galaxy phones from July 2024 to April 2025, exploiting a previously unknown vulnerability in the Android software to steal sens
A recent Yubico study reveals that nearly half of respondents interacted with phishing emails in the past year, highlighting a growing concern about cybersecurity. The most vulnerable demographic is Gen Z, who are not only more likely to engage with
Your web browsing habits are leaving behind a unique digital signature known as a "browser fingerprint," which can reveal personal information despite using privacy measures like VPNs. This fingerprint is composed of various data points, such as lang
The emergence of AI-powered web browsers, such as OpenAI's ChatGPT Atlas and Perplexity's Comet, poses significant security risks to user privacy, with cybersecurity experts warning that these agents can compromise sensitive information like email, c
Researchers have used AI chatbots to create highly convincing phishing emails, highlighting the growing threat of AI-powered cyberattacks in 2026. The emergence of Phishing-as-a-Service (PhaaS) platforms has made it easier and cheaper for low-skilled
Cybercriminals are exploiting weak email authentication settings on the customer support platform Zendesk, sending thousands of spam and harassing messages that appear to come from legitimate companies. This abuse is made possible by lax authenticati
Save StorySave this storySave StorySave this storySextortion-based hacking, which hijacks a victim's webcam or blackmails them with nudes they're tricked or coerced into sharing, has long represented one of the most disturbing forms of cybercrime. No
A sophisticated malware campaign is targeting macOS developers with fake Homebrew and other platform clones, delivering infostealing malware like AMOS and Odyssey through "ClickFix" techniques that trick users into executing malicious Terminal comman
Vietnamese hackers have launched two campaigns using fake browser extensions called SocialMetrics Pro to steal Facebook Business and Ads account credentials. The malware-laced extension, promoted through 37 deceptive ads and tutorials, exfiltrates se
Researchers have uncovered a widespread phishing campaign using vulnerable cellular routers, manufactured by Milesight IoT Co., Ltd., to send millions of SMS-based phishing messages since 2023. These industrial-grade devices, used for connecting traf
Researchers have revived a 12-year-old attack called Pixnapping that can steal sensitive information from Android devices, including two-factor authentication codes and data from popular apps like Google Maps and Signal. The attack works by allowing
A sophisticated phishing campaign is targeting Mac users by impersonating popular online services through search engine ads, with the goal of installing a potent credential stealer called Atomic Stealer. The scam has been detected in various forms, i
Ukraine-based software developer MacPaw has launched Moonlock, a user-friendly cybersecurity app designed to protect macOS systems from hackers and malware. Tailored for everyday users, Moonlock aims to simplify digital security, addressing the growi
Share & Engage Share
Share this article