Cyber security news for all

More

    Mobile Security

    A new wave of cyberattacks linked to North Korean threat actors is taking aim at software developers by embedding malicious code in Python packages....

    The Hidden Risk of Non-Human Identities: Why Secrets Management Must Evolve

    When we think of cybersecurity and identity, usernames, passwords, and multi-factor authentication typically come to mind. But a much larger and growing risk hides in plain sight: the rise of Non-Human Identities (NHIs). Far beyond simple service accounts, NHIs include service principals, Snowflake roles, IAM roles, and unique constructs from...

    New Malware Campaigns Target Android and iOS Users with Fake Apps

    Cybersecurity researchers have identified a surge in malware attacks targeting Android and iOS users through deceptive websites designed to mimic legitimate app download pages. Among the threats uncovered are the well-known SpyNote trojan, along with BadBazaar and MOONSHINE malware. Threat actors are deploying SpyNote by creating fake Google Play Store...

    Massive Credential Leak: Hacker Group Exposes 30,000 Logins Across Global Digital Services

    A major cybersecurity incident has come to light involving a hacker collective known as Daisy Cloud, which has exposed over 30,000 sets of login credentials tied to a wide array of online platforms. The stolen data spans cloud services, financial accounts, government portals, and personal applications. The group is believed...

    China Hints at Involvement in Cyber Operations Targeting U.S. Infrastructure

    In a rare and revealing diplomatic exchange, Chinese officials have subtly acknowledged links to a series of cyber intrusions aimed at critical infrastructure across the United States, according to officials familiar with a confidential summit held late last year. The admission, though indirect, was interpreted by U.S. diplomats as confirmation...

    Phishing Attacks Now Validate Victim Emails in Real-Time to Maximize Credential Theft

    A new phishing method is emerging that uses real-time email validation to ensure only legitimate, high-value targets are exposed to credential theft attempts. Dubbed precision-validating phishing, this tactic stands apart from traditional mass-phishing techniques. Instead of sending out widespread spam to harvest whatever credentials it can, this method confirms that...

    Malware & Threats

    Most Popular

    Stay on op - Ge the daily news in your inbox

    Latest Articles