According to documents, Facebook may have used user devices to eavesdrop on competitors.
According to a new set of unsealed court documents, Facebook initiated a covert initiative in 2016 with the intention of […]
According to a new set of unsealed court documents, Facebook initiated a covert initiative in 2016 with the intention of […]
We’ve identified a recent phishing campaign that uses unique loader malware to spread Agent Tesla, an information stealer and keylogger.
Unidentified threat actors have targeted energy companies and government entities in India with the intention of distributing a modified version
Cybersecurity researchers are issuing a warning that malicious actors are actively exploiting an unpatched and “disputed” vulnerability in the Anyscale
Based on evidence of active exploitation in the open, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a
Google introduced an enhanced iteration of Safe Browsing on Thursday. This development aims to protect users from visiting potentially malicious
A pro-Palestinian hacktivist organization, Handala Hack, asserts that it has compromised the instant messaging service Viber. It would not be
Modern CPU architectures that facilitate speculative execution are now susceptible to a novel data leakage attack, as identified by a
Cybersecurity researchers have discovered that threat actors seeking illicit access to sensitive data may exploit third-party modules for OpenAI ChatGPT
Because Dover Harbour Board and Kent Police violated data protection legislation, the Information Commissioner’s Office (ICO) has reprimanded them. In