Cybercriminals are spreading XWorm RAT through fake invoice emails with Office file attachments. Learn how this stealthy malware operates and how to protect yourself.
Threat Actors
2319 article(s)
For months, Russian ship Yantar tracked Europe's vital undersea cables, exposing vulnerabilities in digital and energy networks and triggering urgent Western defenses.
A zero-day flaw in Gladinet’s CentreStack let hackers steal sensitive files and seize control. Discover the exploit's mechanics, the emergency patch, and why vigilance matters.
Microsoft is ending support for Office 2016 and 2019, leaving millions at risk of cyberattacks. Discover what this means for users and the safest upgrade paths.
Hackers breached Prosper, stealing data from over 17 million accounts. We investigate what happened, what was exposed, and the risks facing fintech users today.
Sotheby’s, the famed auction house, has suffered a significant data breach exposing sensitive client and financial details—highlighting growing cyber risks in the luxury art market.
Recent Windows 11 updates have broken localhost HTTP/2 connections, disrupting development and security tools. Here’s what happened, who’s affected, and how users can respond.
Researchers found hundreds of leaked credentials in VS Code extension marketplaces, exposing software supply chains. Microsoft responded with new security scans and revoked compromised tokens.
Model Manipulation in AI: Risks, Attacks, and Cybersecurity
Model manipulation is when attackers alter AI system behavior by injecting malicious data or prompts, causing unintended or harmful responses.
Sideloading Explained: Risks and Benefits in App Installation
Sideloading is installing apps or software from outside official app stores, often skipping standard security checks and increasing potential risks.