Showing 1 to 12 of 56 results


350+ Malicious Android Apps Removed from Google Play Store
Human Security's Satori team disrupted IconAds, a massive ad fraud operation involving 350+ Android apps generating over 1 billion ad bid requests daily; these apps used deceptive tactics to avoid detection and deliver unwanted ads; Google has removed the apps from the Play Store, but users should m...
350+ Malicious Android Apps Removed from Google Play Store
Human Security's Satori team disrupted IconAds, a massive ad fraud operation involving 350+ Android apps generating over 1 billion ad bid requests daily; these apps used deceptive tactics to avoid detection and deliver unwanted ads; Google has removed the apps from the Play Store, but users should m...
Progress
40% Bias Score


Urgent Apple Security Update Patches Critical iPhone Vulnerabilities
Apple's iOS 18.5 update, released May 12, 2025, addresses critical vulnerabilities (CVE-2025-31251 and CVE-2025-31233) that allow hackers to access user data via maliciously crafted images and videos on iPhones XS and later; urgent user action is needed to install the patch.
Urgent Apple Security Update Patches Critical iPhone Vulnerabilities
Apple's iOS 18.5 update, released May 12, 2025, addresses critical vulnerabilities (CVE-2025-31251 and CVE-2025-31233) that allow hackers to access user data via maliciously crafted images and videos on iPhones XS and later; urgent user action is needed to install the patch.
Progress
56% Bias Score


Microsoft Email Phishing Scam Targets Windows Users
A new wave of phishing attacks targets Microsoft Windows users via hijacked noreply@microsoft.com emails, falsely claiming unauthorized purchases and directing victims to malicious phone numbers for malware installation and potential account compromise.
Microsoft Email Phishing Scam Targets Windows Users
A new wave of phishing attacks targets Microsoft Windows users via hijacked noreply@microsoft.com emails, falsely claiming unauthorized purchases and directing victims to malicious phone numbers for malware installation and potential account compromise.
Progress
52% Bias Score


International Operation Targets Ransomware Malware, Takes Down 300+ Servers
Europol and Eurojust announced a large-scale international operation against malware used in ransomware attacks, resulting in over 300 servers taken down, 20 international arrest warrants issued, and over €3 million in cryptocurrency seized.
International Operation Targets Ransomware Malware, Takes Down 300+ Servers
Europol and Eurojust announced a large-scale international operation against malware used in ransomware attacks, resulting in over 300 servers taken down, 20 international arrest warrants issued, and over €3 million in cryptocurrency seized.
Progress
24% Bias Score


Gmail Phishing Scam Exploits Google OAuth, Steals User Data
Gmail's 1.8 billion users are targeted in a phishing scam using fake subpoena emails from no-reply@accounts.google.com, exploiting Google OAuth to grant scammers access and potentially infecting devices with malware.
Gmail Phishing Scam Exploits Google OAuth, Steals User Data
Gmail's 1.8 billion users are targeted in a phishing scam using fake subpoena emails from no-reply@accounts.google.com, exploiting Google OAuth to grant scammers access and potentially infecting devices with malware.
Progress
40% Bias Score


AI-Powered Cyberattacks Surge, Causing $40 Billion in Annual Losses by 2027
AI-powered cyberattacks targeting Gmail and Outlook users surged in 2025, using sophisticated phishing and automated malware delivery, resulting in a 32% increase in losses to $40 billion annually by 2027, according to Deloitte, requiring stronger security measures beyond passwords and 2FA.
AI-Powered Cyberattacks Surge, Causing $40 Billion in Annual Losses by 2027
AI-powered cyberattacks targeting Gmail and Outlook users surged in 2025, using sophisticated phishing and automated malware delivery, resulting in a 32% increase in losses to $40 billion annually by 2027, according to Deloitte, requiring stronger security measures beyond passwords and 2FA.
Progress
52% Bias Score

Cybercriminals Exploit AI Popularity to Distribute Malware via SEO
Cybercriminals use SEO to promote fake AI software, tricking users into downloading malware like CyberLock and Lucky_Gh0$t, which encrypt files and demand ransoms, impacting users in technology, marketing, and B2B sales sectors.

Cybercriminals Exploit AI Popularity to Distribute Malware via SEO
Cybercriminals use SEO to promote fake AI software, tricking users into downloading malware like CyberLock and Lucky_Gh0$t, which encrypt files and demand ransoms, impacting users in technology, marketing, and B2B sales sectors.
Progress
24% Bias Score

ClickFix Malware Attack Mimics Google Meet
A new cyberattack, ClickFix, uses a fake Google Meet interface and a "Microphone Permission Denied" error message to trick users into pasting a malicious PowerShell command, installing malware on their PCs; this attack, first seen in Spring 2024, is spreading rapidly.

ClickFix Malware Attack Mimics Google Meet
A new cyberattack, ClickFix, uses a fake Google Meet interface and a "Microphone Permission Denied" error message to trick users into pasting a malicious PowerShell command, installing malware on their PCs; this attack, first seen in Spring 2024, is spreading rapidly.
Progress
44% Bias Score

Fake Captcha Attacks Exploit Windows Run Dialog for Malware and Password Theft
Trend Micro reports a surge in fake Captcha attacks tricking Windows users into executing malicious commands via the Run dialog, resulting in malware infections (Lumma Stealer, etc.) and password theft; Microsoft recommends enhanced security practices and mitigation strategies.

Fake Captcha Attacks Exploit Windows Run Dialog for Malware and Password Theft
Trend Micro reports a surge in fake Captcha attacks tricking Windows users into executing malicious commands via the Run dialog, resulting in malware infections (Lumma Stealer, etc.) and password theft; Microsoft recommends enhanced security practices and mitigation strategies.
Progress
52% Bias Score

Microsoft Disrupts Global Lumma Stealer Network
Microsoft's Digital Crimes Unit, along with Europol and Japan's Cybercrime Control Center, dismantled the Lumma Stealer network, taking down 2,300 malicious domains and disrupting communication to 394,000 infected computers, significantly impacting ransomware operations.

Microsoft Disrupts Global Lumma Stealer Network
Microsoft's Digital Crimes Unit, along with Europol and Japan's Cybercrime Control Center, dismantled the Lumma Stealer network, taking down 2,300 malicious domains and disrupting communication to 394,000 infected computers, significantly impacting ransomware operations.
Progress
36% Bias Score

North Korean APT Group123 Targets Windows Systems Globally
North Korea's APT Group123, also known as Cloud Dragon, is launching global attacks targeting Windows credentials via phishing, exploiting vulnerabilities in Microsoft applications and servers, deploying disk wipers, and conducting ransomware operations for financial gain, expanding from its initial...

North Korean APT Group123 Targets Windows Systems Globally
North Korea's APT Group123, also known as Cloud Dragon, is launching global attacks targeting Windows credentials via phishing, exploiting vulnerabilities in Microsoft applications and servers, deploying disk wipers, and conducting ransomware operations for financial gain, expanding from its initial...
Progress
52% Bias Score

Google Warns of Lummac.V2 Infostealer Malware Threat
Google's security team warned about the Lummac.V2 infostealer malware, a variant of Lumma Stealer, which uses fake captcha pages to trick users into executing malicious commands and steal credentials, logins, emails, personal and system details, screenshots, and cookies.

Google Warns of Lummac.V2 Infostealer Malware Threat
Google's security team warned about the Lummac.V2 infostealer malware, a variant of Lumma Stealer, which uses fake captcha pages to trick users into executing malicious commands and steal credentials, logins, emails, personal and system details, screenshots, and cookies.
Progress
48% Bias Score
Showing 1 to 12 of 56 results