Twitter accounts turned into bots
There are as many as 3,200 mobile apps that expose developers’ Twitter account login credentials to the public: cyber crime…
There are as many as 3,200 mobile apps that expose developers’ Twitter account login credentials to the public: cyber crime…
The Lockbit ransomware group, one of the most prolific in the second quarter of this year, is exploiting new exploit…
In recent weeks, the NCSC (National Cyber Security Center) has seen an huge increase in reports of suspicious entries in…
Twitter has lost a large amount of data from its user accounts-the cause is allegedly due to the exploitation of…
Google provides several updates for Android: the cumulative package of updates that fixes 29 vulnerabilities identified in the various software…
A criminal phone phishing fraud is spreading on TikTok with all the virality of a prank: an automated answering machine…
A new criminal operation called 0mega has appeared: it uses ransomware with the double extortion technique and has a website…
EnemyBot is ready to launch attacks against routers, Internet of Things (IoT) devices, and a wide range of server architectures…
Despite threats from hacktivists, NestlĂ© remains active in Russia and Anonymous strikes again stealing 10GB of its customers’ material. In…
The Escobar banking trojan steals victims’ Google Authenticator MFA codes to target banking institutions, bypassing the double factor authentication protecting…