The name of the extension is "Safery: Ethereum Wallet," with the threat actor describing it as a "secure wallet for managing ...
Threat actors are building fully automated attack pipelines in which new exploit code is simply fed to the system —or even ...
The activity, which is taking place between November 10 and 13, 2025, marks the latest phase of Operation Endgame, an ongoing ...
Global cyber roundup: new AI bug bounties, malware threats, GDPR backlash, Cisco zero-days, data leaks, and rising attacks on ...
There are currently no details on how the security defect is being exploited and what's the scale of such efforts. According to data from the Shadowserver Foundation, more than 54,300 Firebox ...
The coordinated campaign has so far published as many as 46,484 packages, according to SourceCodeRED security researcher Paul ...
Google has filed a civil lawsuit in the U.S. District Court for the Southern District of New York (SDNY) against China-based ...
Amazon's threat intelligence team on Wednesday disclosed that it observed an advanced threat actor exploiting two ...
Dynamic Attack Surface Reduction (DASR) changes how we defend. Instead of waiting for threats, DASR works quietly in the ...
The zero-day vulnerability that has been listed as exploited in Tuesday's update is CVE-2025-62215 (CVSS score: 7.0), a ...
Google on Tuesday unveiled a new privacy-enhancing technology called Private AI Compute to process artificial intelligence (AI) queries in a secure platform in the cloud.
Maverick malware spreads via WhatsApp Web, targeting Brazilian banks through PowerShell and browser hijacking.