The Kimwolf botnet has grown to over 2 million Android devices, largely exploiting residential proxy networks, according to cybersecurity firm Synthient. Active since at least August...
Meta has begun addressing vulnerabilities in WhatsApp that allow attackers to “fingerprint” users’ devices, a privacy flaw that can aid in the delivery of sophisticated spyware....
A sophisticated software supply chain attack known as Shai-Hulud has been identified as the root cause of a major cryptocurrency theft that drained approximately $8.5 million...
Two American cybersecurity professionals have pleaded guilty to federal charges after admitting they participated in ransomware attacks linked to the notorious BlackCat, also known as Alphv,...
A software supply chain attack involving the self-replicating Shai-Hulud 2.0 worm has been linked to a $8.5 million theft from cryptocurrency wallet Trust Wallet, the company...
The European Space Agency (ESA) has confirmed that a cyberattack has compromised some of its systems after a hacker attempted to sell data allegedly stolen from...
Attack Surface Management (ASM) tools are designed to reduce cyber risk, but many organizations struggle to demonstrate a clear return on investment. While these platforms excel...
Indian government agencies, academic institutions, and strategic organizations are under a new wave of cyberattacks attributed to the threat actor Transparent Tribe, also known as APT36....
The global cybersecurity sector experienced a year of unprecedented consolidation in 2025, with merger and acquisition activity reaching new financial heights. Eight cybersecurity acquisitions surpassed the...
The European Space Agency (ESA) has confirmed that parts of its digital infrastructure were compromised following claims by a hacker offering to sell data allegedly stolen...