The more you share online, the more you open yourself to social engineering If you've seen the viral AI work pic trend where ...
AI-guided impersonation attacks have become both more numerous and more sophisticated as the technology improves, and will likely not abate anytime soon.
An exhaustive report from a Google security team says state-sponsored hackers from Russia, North Korea, China, and Iran are ...
Security experts warn that "an active and ongoing campaign" being waged by ShinyHunters extortionists has at least 150 ...
Social engineering dominates cyber attacks in South Africa, exploiting heavy reliance on card-based payment systems.
You can infect your PC with malware without ever leaving Notepad, thanks to recent updates and additions. Hooray.
In a report published on February 12, ahead of the Munich Security Conference, Google Threat Intelligence Group (GTIG) and Google DeepMind shared new findings on how cybercriminals and nation-state ...
Findings show that the underground marketplace for illicit AI tools has matured, lowering the barrier for less sophisticated ...
AMOS infostealer is targeting macOS users by abusing popular AI apps and extension marketplaces to harvest credentials. Flare ...
From technical compromise to AI-driven attacks, cyber criminals increasingly see software developers as prime targets, creating systemic risks CISOs must address.
When Microsoft patched a vulnerability last summer that allowed threat actors to use Windows’ shortcut (.lnk) files in ...
Crypto investors faced a 207% spike in losses from "phishing" scams in January, as attackers shifted tactics to target ...