Google has taken legal action against two app developers for participating in an "international online consumer investment fraud scheme" that deceived users into downloading...
Threat actors are exploiting a critical vulnerability in Magento to inject a persistent backdoor into e-commerce websites.
The exploit targets CVE-2024-20720 (CVSS score: 9.1), characterized...
Google is introducing a new feature in Chrome called Device Bound Session Credentials (DBSC) to enhance user protection against session cookie theft by malware....
The Android banking trojan Vultur has returned with new capabilities and enhanced methods to evade analysis and detection, allowing hackers to remotely access a...
A previously inactive botnet has resurfaced to use end-of-life small home/small office (SOHO) routers and IoT devices to power a malicious proxy service called...
Red Hat on Friday released an "urgent security alert" warning that two versions of a popular data compression library called XZ Utils (previously LZMA...
Malicious ads and fake websites are being used to distribute two different stealer malware, including Atomic Stealer, to target Apple macOS users.
According to a...