News

UpCrypter phishing since Aug 2025 uses fake voicemails, RAT payloads, and anti-analysis, hitting global industries.
The popular Nx build system, boasting 4 million downloads each week, was exploited in the first supply chain breach to use AI assistants.
A global phishing campaign has been identified using personalized emails and fake websites to deliver malware via UpCrypter ...
Malicious SVG files on adult websites hide JavaScript that hijacks Facebook sessions, secretly liking posts, and potentially exposing victims to identity theft and credential harvesting.
Blockchain research firm Kaiko gave XRP Ledger a rough security score in a recent ranking, but developers are pushing back on ...
Software Engineer Creates Tool to Track User Behavior in Data Analysis Software  Recent data shows that using outdated data visualization systems and other ...
XRP Ledger, the blockchain behind the world’s third-largest cryptocurrency, has come under scrutiny after ranking last in a ...
UNC6384 is assessed to share tactical and tooling overlaps with a known Chinese hacking group called Mustang Panda, which is also tracked as BASIN, Bronze President, Camaro Dragon, Earth Preta, ...
A popular free VPN has been accused of spying on its userbase after security researchers observed it taking non-consenting ...
GLM-4.5V is built on the new GLM-4.5-Air text base and uses a modern VLM pipeline-vision encoder, MLP adapter, and LLM decoder-with 64K multimodal context, native image and video inputs, and enhanced ...
Security researchers Cisco Talos have discovered a brand new malware framework which they say really goes the extra mile to infect a device. PS1Bot can log keystrokes, grab cryptocurrency data, and ...
Visible gold observed in first six diamond drill holes drilled at the Contact zone Drilling to date has traced mineralization ...