Android Malware Has Grown Up: And It’s Coming for Identity, Not Just Phones
Android malware has evolved into professional, modular platforms combining droppers, SMS interception, and remote control. Mobile devices are now a…
Android malware has evolved into professional, modular platforms combining droppers, SMS interception, and remote control. Mobile devices are now a…
The LastPass data breach and subsequent £1.2 million ICO fine highlight a critical reality for CISOs: modern security failures are…
A suspicious ZIP from Yealink’s official CDN contained a trojanized executable, suggesting a possible supply-chain compromise. This case highlights why…
The Swiss Cyber AI Award honors the most innovative projects combining Artificial Intelligence and Cybersecurity. Open to participants from Switzerland…
Critical Fortinet flaws (CVE-2025-59718/59719) allow attackers to bypass FortiCloud SSO using malicious SAML messages. Although not enabled by default, many…
Sryxen is a new stealer that bypasses Chrome’s App-Bound Encryption by abusing headless Chrome and the DevTools Protocol, forcing the…
Allurity strengthens its European cybersecurity footprint by acquiring MSF Partners, a Swiss OT security specialist protecting critical infrastructure. The move…
LANDFALL is a sophisticated Android spyware exploiting a Samsung zero-day via DNG zero-click attacks delivered through WhatsApp images. This commercial-grade…
Cloudflare suffered a global service outage impacting the dashboard, Access, WARP, and application services. Recovery is underway. The incident highlights…
AI-driven malware is no longer theoretical. PROMPTFLUX, an experimental VBScript malware leveraging Gemini for real-time code regeneration, shows how threat…
A critical vulnerability in Fortinet's FortiWeb Web Application Firewall has been actively exploited, allowing attackers to gain administrator access. Organizations…