A compromised Chrome extension with 7,000 users was updated to deploy malware, strip security headers, and steal cryptocurrency wallet seed phrases.
Security researchers say exploits used by governments to hack into iPhones have been found to be used by cybercriminals. They warned of an emerging market for "secondhand" exploits.
A highly sophisticated set of iPhone hijacking techniques has likely infected tens of thousands of phones or more. Clues suggest it was originally built for the US government.
It has added to what Israel has repeatedly shown to be a longstanding penetration of Iran’s inner circles, which has enabled it to assassinate scores of Iran’s top nuclear scientists and officials ...
After U.S. and Israeli forces started bombing Iran, reports say cyber operations have disrupted communications, supported surveillance activities, and have been used in psychological operations.
An OpenClaw vulnerability allowed malicious websites to take over AI agents, exposing sensitive information and enabling data ...
Researchers warn that a newly identified open-source AI security testing platform called CyberStrikeAI was used by the same threat actor behind a recent campaign that breached hundreds of Fortinet ...
A 22-year-old Alabama man pleaded guilty to extortion, cyberstalking, and computer fraud charges after hijacking the social media accounts of hundreds of young women (including minors).
What makes this campaign so striking is not just the malware, but where it is being stored. By shifting malicious code into ...