Trust Wallet says attackers who compromised its browser extension right before Christmas have drained approximately $7 ...
A ransomware gang exploited the critical React2Shell vulnerability (CVE-2025-55182) to gain initial access to corporate networks and deployed the file-encrypting malware less than a minute later.
A newly discovered third variant of the Shai Hulud malware is raising fresh concerns about the security of the open-source software supply chain, as researchers warn that the latest version shows more ...
Shai Hulud is a malware campaign first observed in September targeting the JavaScript ecosystem that focuses on supply chain ...
Researchers uncovered 27 malicious npm packages used over five months to host phishing pages that steal credentials from ...
An 8-year-old boy survived one of Russia’s worst attacks on Ukrainian children. After, investigators — and his family — ...
The malicious fork, named ‘lotusbail’ has all the same functionality as the legitimate project, but it also steals WhatsApp ...
In an extraordinarily blunt intervention, Air Chief Marshal Sir Richard Knighton warned that Russia's military strength is increasing and is something to fear, with Russian troops now battle-hardened ...
Discover the top seven penetration testing tools essential for enterprises in 2025 to enhance security, reduce risks, and ensure compliance in an evolving cyber landscape. Learn about their core ...
Infosecurity has selected five of the most significant vulnerability exploitation campaigns of 2025 that led to major ...
Security researchers have uncovered a troubling new malware campaign that has been hiding malicious code inside the logo ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results