VoltSchemer attacks use wireless chargers to inject voice commands, fry phones
A team of academic researchers show that a new set of attacks called 'VoltSchemer' can inject voice commands to manipulate a smartphone's…
A team of academic researchers show that a new set of attacks called 'VoltSchemer' can inject voice commands to manipulate a smartphone's…
The Anatsa banking trojan has been targeting users in Europe by infecting Android devices through malware droppers hosted on Google…
South Korean researchers have publicly disclosed an encryption flaw in the Rhysida ransomware encryptor, allowing the creation of a Windows…
Defense Secretary Lloyd Austin returned to Walter Reed, according to Pentagon officials, to be treated for "an emergent bladder issue."
A new password-stealing malware named Ov3r_Stealer is spreading through fake job advertisements on Facebook, aiming to steal account credentials and…
A Chinese cyber-espionage group breached the Dutch Ministry of Defence last year and deployed malware on compromised devices, according to the…
Threat actor behind the Activator macOS backdoor is using pirated apps to distribute the malware in what could be a…
A previously unknown traffic distribution system (TDS) named 'VexTrio' has been active since at least 2017, aiding 60 affiliates in…
A Texas woman working for a baby clothing company was reportedly denied a work-from-home option that would have enabled her…
Learn how threat actors utilize credentials to break into privileged IT infrastructure to create data breaches and distribute ransomware. [...]