Security researchers from Trend Micro recently published an in-depth technical analysis of the latest iteration of the ...
Hackers use fake Google search results to trick users into downloading lookalike apps laced with malware that have been ...
The campaign has been codenamed EvilAI by Trend Micro, describing the attackers behind the operation as "highly capable" ...
Security researchers from Blackpoint SOC recently discovered a fraudulent Microsoft Teams downloads page hosted at ...
PromptLock may be just the first of many AI-powered malware strains. Its polymorphic, adaptive design forces organisations to ...
The multi-stage attack uses encrypted shellcode, steganography, and reflective DLL loads to deploy XWorm without leaving ...
Mac Security Bite is exclusively brought to you by Mosyle, the only Apple Unified Platform. Making Apple devices work-ready and ...
Cofense research sees cybercriminals spoof legal firms with AI tools, spreading malware that steals crypto and may evolve ...
No system is safe anymore. The newest variant of LockBit ransomware targets Windows, Linux, and VMware ESXi systems ...
Google's upcoming requirements to verify app developers threaten to 'end the F-Droid project and other free/open-source app ...
Researchers at Cisco Talos have uncovered a sophisticated cyberespionage campaign tied to Chinese-speaking advanced ...
AI now arms both cyber defenders and attackers, and that's reshaping South Africa’s digital security landscape.