How to easily encrypt your files on an Android phone - for free ...
Ransomware attacks have grown in complexity and frequency over the past decade, but as horrible as an attack can be, malicious actors often honor the ransom and decrypt files after receiving payment.
Check Point researchers have uncovered a new ransomware-as-a-service threat with significant design flaws. Vect 2.0 is unable ...
The maker of the popular open-source file encryption software VeraCrypt said Microsoft locked his online account, which may prevent device owners from booting up their computers.
A series of malicious LNK files targeting users in South Korea has been detected using a multi-stage attack chain that uses GitHub as command and control (C2) infrastructure. The campaign relies on ...
Recently observed Trigona ransomware attacks are using a custom, command-line tool to steal data from compromised ...
Just because you have antivirus software installed on your PC doesn't mean a zero-day Trojan can't steal your personal data. The top encryption software keeps you safe from malware (and the NSA). When ...
Threat actors are exploiting the recent Claude Code source code leak by using fake GitHub repositories to deliver Vidar information-stealing malware. Claude Code is a terminal-based AI agent from ...
Think twice before opening unexpected WhatsApp attachments—a new kind of malware attack has let hackers seize control of Windows PCs simply through a single, ...
Socket has notified the Eclipse Foundation, which oversees the Open VSX marketplace, of the latest fraudulent additions, and Burckhardt expects that by now all 73 have been deleted.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results