TrickMo malware steals Android PINs using fake lock screen

Forty new variants of the TrickMo Android banking trojan have been identified in the wild, linked…

Pokemon dev Game Freak confirms breach after stolen data leaks online

Japanese video game developer Game Freak has confirmed it suffered a cyberattack in August after source…

Iranian Threat Actor OilRig Exploits Windows Kernel Flaw in UAE Cyber Espionage Campaign | Black Hat Ethical Hacking

The STEALHOOK Backdoor and Privilege Escalation Tactics After initial access—gained by exploiting vulnerable web servers—OilRig deploys…

Google warns uBlock Origin and other extensions may be disabled soon

Google’s Chrome Web Store is now warning that the uBlock Origin ad blocker and other extensions may…

Iranian hackers now exploit Windows flaw to elevate privileges

The Iranian state-sponsored hacking group APT34, aka OilRig, has recently escalated its activities with new campaigns targeting…

Microsoft deprecates PPTP and L2TP VPN protocols in Windows Server

Microsoft has officially deprecated the Point-to-Point Tunneling Protocol (PPTP) and Layer 2 Tunneling Protocol (L2TP) in…

OpenAI confirms threat actors use ChatGPT to write malware

OpenAI has disrupted over 20 malicious cyber operations abusing its AI-powered chatbot, ChatGPT, for debugging and…

CISA: Hackers abuse F5 BIG-IP cookies to map internal servers

CISA is warning that threat actors have been observed abusing unencrypted persistent F5 BIG-IP cookies to identify…

Casio confirms customer data stolen in a ransomware attack

Casio now confirms it suffered a ransomware attack earlier this month, warning that the personal and…

Ukraine arrests rogue VPN operator providing access to Runet

Ukraine’s cyber police have arrested a 28-year-old man who operated a massive virtual private network (VPN)…