Hackers Abuse Russian Bulletproof Host Proton66 for Global Attacks and Malware Delivery

Cybersecurity researchers have disclosed a surge in "mass scanning, credential…

Speedify VPN Vulnerability on macOS Exposes Users to System Takeover

A major security flaw in the Speedify VPN application for…

Hackers Abuse Zoom’s Remote Control to Access Users’ Computers

A newly uncovered hacking campaign is targeting business leaders and…

ASUS Router Flaw Allows Hackers to Remotely Execute Malicious Code

ASUS has acknowledged multiple critical vulnerabilities affecting its routers that…

Critical PyTorch Vulnerability Allows Hackers to Run Remote Code

A newly disclosed critical vulnerability (CVE-2025-32434) in PyTorch, the widely…

Static Scans, Red Teams and Frameworks Aim to Find Bad AI Models

With hundreds of AI models found to harbor malicious code,…

Google Removes 5.5 Billion Malicious Ads, Suspends 700,000+ Offending Advertisers

Google has announced the removal of 5.5 billion malicious advertisements…

New Chrome Installer Breaks With Error “This App can’t Run on your PC” on Windows 10 & 11

Google’s Chrome browser installation process has been disrupted by a…

OBSCURE#BAT Malware Uses Fake CAPTCHA Pages to Deploy Rootkit r77 and Evade Detection

A new malware campaign has been observed leveraging social engineering…

U.S. Treasury Lifts Tornado Cash Sanctions Amid North Korea Money Laundering Probe

The U.S. Treasury Department has announced that it's removing sanctions…

11 ruinöse Ransomware-Bedrohungen

Für Unternehmen ist Ransomware weiterhin eine existenzielle Bedrohung, für Kriminelle ein immer einträglicheres (Service)geschäft. Gonin | shutterstock.com Ransomware bleibt branchenübergreifend auf dem Vormarsch und entwickelt […]