The Handala group claimed responsibility for the attack.
Android 17 blocks non-accessibility apps from the Accessibility API in Advanced Protection Mode, reducing malware abuse and the attack surface.
Attackers are using fake Claude Code install pages and malicious search ads to spread infostealer malware targeting Windows ...
A new malware strain dubbed Slopoly, likely created using generative AI tools, allowed a threat actor to remain on a compromised server for more than a week and steal data in an Interlock ransomware ...
NPCI has responded to a CloudSEK report commenting on how fraudsters bypass security protections in UPI apps. Here's all you ...
BlackSanta is a malware module that kills EDR and AV at the kernel level prior to unleashing the malware’s final purpose.
Your Asus router may have been targeted by a sophisticated form of malware capable of adding devices to a botnet and using ...
A phishing campaign is using a fake Google Account security page to deliver a web-based app capable of stealing one-time passcodes, harvesting cryptocurrency wallet addresses, and proxying attacker ...
Transparent Tribe uses AI tools to mass-produce polyglot malware targeting India using Slack, Discord, and Google Sheets C2.
The report, based on data from millions of endpoints protected by HP Wolf Security between October and December 2025, found that at least 14 percent of email threats bypassed one or more email gateway ...
Hackers are impersonating IT staff in Microsoft Teams to trick employees into installing malware, giving attackers stealthy ...