Privacy and Security NewsProton VPN Adds Discreet Icon to Protect Users from Inspections August 6, 2024 by Alex Lekander
News WindowsWindows Smart App Control and SmartScreen Possible to Bypass August 5, 2024 by Alex Lekander
News RansomwareZola Ransomware Springs to Action as Latest Proton Variant August 5, 2024 by Alex Lekander
News SecurityDeep-Tempest Attack Can Eavesdrop Screens via HDMI Signals August 5, 2024 by Alex Lekander
Mac NewsmacOS Malware Disguised as The Unarchiver App Steals Keychain Data August 2, 2024 by Alex Lekander
News PhishingRussian Hackers Use Audi Car Lure to Infect Diplomats with Malware August 2, 2024 by Alex Lekander
News Security WindowsNovel Windows Backdoor BITSLOTH Exploits BITS for C2 Operations August 1, 2024 by Alex Lekander
Data Breach SecurityMassive Info Stealer Logs Enable Bug Bounty Scams Against Firms August 1, 2024 by Alex Lekander
News RansomwareOneBlood Suffers Outage from Ransomware Attack, Calls for Donations July 31, 2024 by Alex Lekander
News Security SoftwareGoogle Fortifies Chrome Against Infostealer Malware with App-Bound Encryption July 31, 2024 by Alex Lekander
News SecurityThreat Actors Target Greedy Crypto Users by Faking Wallet Leaks July 30, 2024 by Alex Lekander
News RansomwarePotential Data Loss from Columbus Ransomware Attack Under Investigation July 30, 2024 by Alex Lekander
News RansomwareRansomware Actors Exploit VMware ESXi Flaw for Mass Encryption July 30, 2024 by Alex Lekander
News PhishingProofpoint’s Services Abused to Dispatch Millions of Phishing Emails July 29, 2024 by Alex Lekander
Android NewsMandrake Spyware Evades Detection on Google Play for Two Years July 29, 2024 by Alex Lekander