The Vercel breach: OAuth attack exposes risk in platform environment variables

How Kopeechka, an Automated Social Media Accounts Creation Service, Can Facilitate Cybercrime

Underground Groups Use Stolen Identities and Deepfakes

Ransomware Actor Abuses Genshin Impact Anti-Cheat Driver to Kill Antivirus

Malware with 2 zero-day exploits on macOS computers

Threat Actors Now Target Docker via Container Escape Features

Xcsset Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari

The XCSSET Malware: Inserts Malicious Code Into Xcode Projects, Performs UXSS Backdoor Planting in Safari, and Leverages Two Zero-day Exploits

An In-Depth Technical Analysis of CurveBall (CVE-2020-0601)

Running a Realistic Factory Honeypot to Capture Real Threats

Cybercriminals Use Malicious Memes That Communicate with Malware

GDPR vs. Blockchain: Technology vs. The Law

How Cybercriminals Can Abuse Chat Platform APIs as C&C; Infrastructures

A Shift in the ATM Malware Landscape from Physical to Network-based Attacks

The Crisis of Connected Cars: When Vulnerabilities Affect the CAN Standard

Android Backdoor GhostCtrl Can Silently Record Your Audio, Video, and More

How Propagandists Abuse the Internet and Manipulate the Public

Researchers discover malware that activates when user hovers mouse over links and images in MS PowerPoint docs

FLocker Mobile Ransomware Crosses to Smart TV

Let Me Get That Door for You: Remote Root Vulnerability in HID Door Controllers

Let's Encrypt Now Being Abused By Malvertisers

Prototype Nation: The Chinese Cybercriminal Underground in 2015

Setting the Record Straight on Baidu's Moplus SDK and the Wormhole Vulnerability

First Java Zero-Day Attack in Two Years Targets NATO and US Defense Organizations

Trend Micro Discovers New Java Zero-Day Exploit

Hacking Team Uses UEFI BiOS Rootkit to Keep RCS 9 Agent in Target Systems

Not So Spooky: Linux “Ghost” Vulnerability