Hackers Use .NET MAUI to Target Indian and Chinese Users with Fake Banking, Social Apps
Mar 25, 2025Ravie LakshmananMobile Security / Data Theft Cybersecurity researchers are calling…
See How Hackers Breach Networks and Demand a Ransom
Mar 14, 2025The Hacker NewsData Protection / Ransomware Cyber threats evolve daily.…
GSMA Confirms End-to-End Encryption for RCS, Enabling Secure Cross-Platform Messaging
Mar 14, 2025Ravie LakshmananMobile Security / Encryption The GSM Association (GSMA) has…
FIN7, FIN8, and Others Use Ragnar Loader for Persistent Access and Ransomware Operations
Mar 07, 2025Ravie Lakshmanan Threat hunters have shed light on a "sophisticated…
Vo1d Botnet’s Peak Surpasses 1.59M Infected Android TVs, Spanning 226 Countries
Mar 03, 2025Ravie LakshmananMobile Security / Botnet Brazil, South Africa, Indonesia, Argentina,…
Space Pirates Targets Russian IT Firms With New LuckyStrike Agent Malware
Feb 27, 2025Ravie LakshmananMalware / Network Security The threat actor known as…
Apple Drops iCloud’s Advanced Data Protection in the U.K. Amid Encryption Backdoor Demands
Feb 21, 2025Ravie LakshmananData Protection / Encryption Apple is removing its Advanced…
8Base Ransomware Data Leak Sites Seized in International Law Enforcement Operation
Feb 11, 2025Ravie LakshmananCybercrime / RansomwareSource: The Nation A coordinated law enforcement…
DeepSeek App Transmits Sensitive User and Device Data Without Encryption
Feb 07, 2025Ravie LakshmananMobile Security / Artificial Intelligence A new audit of…