A sophisticated phishing campaign targeting cryptocurrency users through more than 20 malicious Android applications distributed via the Google Play Store.
These fraudulent apps impersonate popular crypto wallets including SushiSwap, PancakeSwap, Hyperliquid, and Raydium to steal users' sensitive mnemonic phrases, which serve as master keys...
A novel method for storing digital images within Domain Name System (DNS) records has been developed, demonstrating an innovative approach to data storage and retrieval.
This technique leverages DNS TXT records, traditionally used for text verification and configuration information, to store encoded image data...
IBM has disclosed a critical security vulnerability in its Backup, Recovery and Media Services for i platform that could allow attackers to gain elevated privileges and execute malicious code with enhanced system access.
The vulnerability, tracked as CVE-2025-33108, affects versions 7.5 and 7.4 of...
A critical security vulnerability discovered in KIA Ecuador vehicles manufactured between 2022 and 2025 has exposed thousands of cars to potential theft through exploitable keyless entry systems.
Independent hardware security researcher Danilo Erazo identified that these vehicles use outdated learning code technology instead of...
New findings from a leading cybersecurity firm’s Q1 2025 report have spotlighted a critical shift in the threat landscape facing Industrial Automation Systems (IAS).
The Internet, once a secondary attack vector, has now emerged as the primary source of malicious activity targeting industrial control...
A recent investigation into advanced persistent threat activity has revealed a sophisticated attack chain orchestrated by the North Korea-linked Kimsuky group.
This operation, running for over two months in early 2025, targeted individuals involved with North Korean defector support, defense circles, and NGOs.
The...