A surge in phishing campaigns abusing Microsoft’s OAuth device code authorization flow has been observed with multiple threat ...
It showed that North Korea remains the biggest crypto threat actor, accounting for 60% of the funds stolen from January to ...
The UK’s tax office has received 135,500 reports of suspected scams in the past 10 months including 4800 related to self ...
A new variant of the BeaverTail malware linked to North Korean hackers has been identified targeting cryptocurrency traders and developers ...
ISACA has been appointed by the US Department of Defense (DoD) as the global credentialing authority for the Cybersecurity ...
A critical flaw in the Motors WordPress theme affecting more than 20,000 installations allows low-privileged users to gain ...
The NASDAQ-listed company filed a notification to the Maine Attorney General’s Office that the personal information of more ...
A prolific China-linked threat group is turning misconfigured servers in European government networks into relay nodes, in ...
The technique, dubbed Lies-in-the-Loop (LITL), exploits the trust users place in confirmation prompts, turning a safeguard ...
Law enforcers from across Europe have come together to tackle a major Ukraine-based fraud operation said to have cost ...
In this article, Infosecurity has set out the top ten cyber-attacks of 2025, which have been decided based on factors such as ...
A new phishing campaign has been identified, delivering the Phantom information-stealing malware via an ISO attachment ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results