Browser extensions turned malicious after years of legitimate operation in DarkSpectre campaign affecting millions. The ...
Chrome extensions called "Phantom Shuttle" stole user data for years before Google removed them from the Chrome Web Store ...
Zoom users should exercise extreme caution when installing browser extensions, particularly those claiming Zoom-related ...
Discover the top antivirus software solutions for Android devices in 2026, designed to protect enterprises from sophisticated mobile threats, including ransomware and phishing. Get the insights you ...
A new Android banking trojan called Sturnus is shaping up to be one of the most capable threats we have seen in a while. It ...
Android malware operations evolve with droppers SMS theft and remote access tools spreading fast and risking user data and bank accounts.
The North Korean threat actor known as Kimsuky has been linked to a new campaign that distributes a new variant of Android malware called DocSwap via QR codes hosted on phishing sites mimicking ...
HP Threat Research just issued a new security report detailing a growing trend by attackers towards hijacking session cookies as an alternative means to tried-and-true credential theft. The reason ...
Choosing a wireless carrier is no longer just about the coverage. In fact, you're thinking more about its features and convenience. Despite being an early champion of RCS messaging and giving Android ...
A researcher warned that more than 400 NPM libraries, including at least 10 crypto packages mostly tied to ENS, were compromised by Shai Hulud malware. A major JavaScript supply-chain attack has ...
An inherent insecurity in the increasingly popular artificial intelligence (AI)-powered developer environment Cursor allows attackers to take over its browser to deliver credential-stealing attacks.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results