Security
Rooting Android invites hackers: up to 3,000 times more vulnerable
A new report has revealed that rooted devices are orders of magnitude more vulnerable to various threats.
Read more about Rooting Android invites hackers: up to 3,000 times more vulnerable
Phishing campaign shifts focus to Macs after browsers enhance security on Windows
A phishing campaign, which initially targeted Windows users by masquerading as Microsoft security alerts, is now aiming at Mac users.
Read more about Phishing campaign shifts focus to Macs after browsers enhance security on Windows
Cybercrime karma: Babuk 2 ransomware steals from fellow crooks, makes fraudulent claims
Babuk 2 ransomware is making waves, claiming dozens of high-profile cyberattacks in a short time. Yet, other threat actors are accusing Babuk 2 of stealing their work, calling it a fraud. Evidence supports their claims and some security researchers seem to agree.
Read more about Cybercrime karma: Babuk 2 ransomware steals from fellow crooks, makes fraudulent claims
Top 10 secrets iOS apps leak without you knowing
Downloading an app should be safe. Unfortunately, this isn’t always the case. A Cybernews investigation found that 71% of iOS apps leak sensitive secrets, putting your data at risk.
Read more about Top 10 secrets iOS apps leak without you knowing
Better update now – a critical security flaw found in Apache Tomcat
A critical Apache Tomcat vulnerability puts companies and cloud platforms at risk, allowing attackers to alter files and execute malicious code.
Read more about Better update now – a critical security flaw found in Apache Tomcat
Dark Crystal trojan targets Ukrainians via Signal messages
Russians are once again ramping up their efforts to snoop on Ukrainian soldiers.
Read more about Dark Crystal trojan targets Ukrainians via Signal messages
Maximum risk flaw affects major server remote management system MegaRAC
The widely used server remote management system MegaRAC contains a critical flaw that hackers can exploit to bypass authentication and take full control of servers. Major brands like HPE, Asus, Lenovo, and ASRockRack are affected, and firmware updates are underway.
Read more about Maximum risk flaw affects major server remote management system MegaRAC
Hackers using AI agents more often for account takeover – Gartner
AI agents are becoming increasingly popular with hackers for exploiting online accounts. By 2027, they will reduce the time to take over an account by 50%.
Read more about Hackers using AI agents more often for account takeover – Gartner
Millions of Android TV boxes disconnected from hackers, but the risk remains
A record five million devices, mostly Android TV boxes, are running malware that can no longer call back to hackers after authorities cut off their controllers. However, the devices are still dangerous, and owners should replace them.
Read more about Millions of Android TV boxes disconnected from hackers, but the risk remains
Card collectors' secrets spilled in massive Collectibles.com leak
Collectibles.com, a collectible cards marketplace, has leaked sensitive details of nearly 900K customers, exposing clients’ card listings, transaction records, full names, and other sensitive information.
Read more about Card collectors' secrets spilled in massive Collectibles.com leak
Fraudulent Android apps displaying intrusive ads downloaded 60 million times on Google Play
Hundreds of Android apps are showing out-of-context ads and trying to persuade users to give away their credentials.
Read more about Fraudulent Android apps displaying intrusive ads downloaded 60 million times on Google Play
Major US teacher's union breach exposed 500k members' to hackers
Over 500,000 members of Pennsylvania's major teacher's union had sensitive personal and financial data stolen in a cyberattack, despite PSEA reassurances.
Read more about Major US teacher's union breach exposed 500k members' to hackers
Hackers hide malware in link files, but Microsoft refuses to fix the flaw
State-sponsored hackers from North Korea, Iran, Russia, and China are crafting malicious links that compromise governments, military, and other critical organizations, leading to espionage and data theft. Yet, Microsoft declined to address the vulnerability with a security patch, Trend Micro has said in a report.
Read more about Hackers hide malware in link files, but Microsoft refuses to fix the flaw
“Pay me or I tell Snowden:” are cybercriminals getting more desperate?
Desperation or creativity – how low are ransomware gangs ready to go to get paid? One gang has threatened to contact Edward Snowden if its victim doesn’t pay a ransom.
Read more about “Pay me or I tell Snowden:” are cybercriminals getting more desperate?
Over 320K Medicare applications exposed, revealing patients’ health data
Insurance brokerage firm Oberlin Marketing has left an open bucket leaking hundreds of thousands of sensitive documents, including customer health condition status and financial info.
Read more about Over 320K Medicare applications exposed, revealing patients’ health data
DeepSeek created Chrome infostealer without hesitation, company remains silent
Adoption of AI tools is soaring, and so are the inevitable safety issues. Researchers have found a new way to break popular AI models to commit crimes.
Read more about DeepSeek created Chrome infostealer without hesitation, company remains silent
New trojan can spy, steal crypto and mask itself to avoid detection
A new Windows remote access trojan (RAT), dubbed StilachiRAT, uses sophisticated techniques to avoid detection and can do tasks from reconnaissance to cryptocurrency theft.
Read more about New trojan can spy, steal crypto and mask itself to avoid detection
Hackers know half of passwords entered online, Cloudflare finds
People use already compromised passwords 41% of the time when logging into email, streaming services, social networks, or any other online services, Cloudflare’s analysis reveals.
Read more about Hackers know half of passwords entered online, Cloudflare finds