The North Korean threat actors behind the Contagious Interview campaign, also tracked as WaterPlum, have been attributed to a malware family tracked as StoatWaffle that's distributed via malicious ...
A powerful iPhone-hacking technique known as DarkSword has been discovered in use by Russian hackers. It can take over devices running iOS 18 that simply visit infected websites. “A vast number of iOS ...
Sweden is investigating a reported leak tied to CGI Sverige after hackers claimed they exposed source code from the country’s e-government platform. A threat actor has claimed to have leaked source ...
Anthropic’s Claude Code assistant has been abused in a cyberattack against the Mexican government’s systems, Israeli cybersecurity startup Gambit Security reports. As part of the attack, ten Mexican ...
Hackers are hijacking Microsoft enterprise accounts by abusing a legitimate device-code authentication feature, tricking victims into entering attacker-generated codes on Microsoft’s own login portal.
Device code phishing is not new, with multiple threat actors having used this method to breach accounts in the past. In February 2025, the Microsoft Threat Intelligence Center warned that Russian ...
A federal grand jury in Nebraska has handed down an indictment charging 31 more people in connection with what authorities are calling a nationwide ATM hacking conspiracy. The charges include ...
BeyondTrust warns of critical RCE flaw CVE-2026-1731 in RS and PRA Vulnerability allows unauthenticated OS command execution, risking compromise and data exfiltration Patch released February 2, 2026; ...
Hackers have listed 860GB of internal source code belonging to the American retail corporation Target for sale on an underground forum. The attackers allege to have exfiltrated the trove from the ...