News

Inside a Modern Fraud Attack: From Bot Signups to Account Takeovers

Modern fraud attacks look like a relay race where different tools and actors handle each stage of the journey from signu...
News

Coruna iOS exploit framework linked to Triangulation attacks

The Coruna exploit kit is an evolution of the framework used in the Operation Triangulation espionage campaign, which in...
News

Russia arrests suspected owner of LeakBase cybercrime forum

Russian police in the Rostov region arrested a Taganrog resident believed to be the owner and administrator of LeakBase,...
News

Suspected RedLine infostealer malware admin extradited to US

An Armenian suspect was extradited to the United States to face criminal charges for allegedly helping manage RedLine, o...
News

GitHub adds AI-powered bug detection to expand security coverage

GitHub is adopting AI-based scanning for its Code Security tool to expand vulnerability detections beyond the CodeQL sta...
News

PolyShell attacks target 56% of all vulnerable Magento stores

Attacks leveraging the ‘PolyShell’ vulnerability in version 2 of Magento Open Source and Adobe Commerce installations ar...
News

Bubble AI app builder abused to steal Microsoft account credentials

Threat actors are evading phishing detection in campaigns targeting Microsoft accounts by abusing the no-code app-buildi...
News

New Torg Grabber infostealer malware targets 728 crypto wallets

A new info-stealing malware called Torg Grabber is stealing sensitive data from 850 browser extensions, more than 700 of...
News

Citrix urges admins to patch NetScaler flaws as soon as possible

Citrix has patched two vulnerabilities affecting NetScaler ADC networking appliances and NetScaler Gateway secure remote...