Beware the growing spyware wave. For the first time, commercial surveillance vendors last year topped Google's list of groups that exploited zero-day vulnerabilities in the wild, overtaking ...
ZeroDayRAT spyware compromises iPhone and Android devices to access messages, notifications, location data and live camera ...
Microsoft is censoring the word "Microslop" on its official Copilot Discord server and reportedly even banning users for ...
A fake Google security site installs a malicious PWA that steals OTPs, crypto wallets, and location data. Here’s how the ...
Of the 90 zero-days GTIG tracked in 2025, 43 hit enterprise tech Zero-day exploitation targeting enterprise tech products reached an all-time high last year, with China-linked cyber-espionage groups ...
Exploitation of zero-days by commercial surveillance and spyware developers outpaced exploitation by nation-state actors last year, according to a report.
It's the end of the world as we know it, and AI feels fine Anthropic economists Maxim Massenkoff and Peter McCrory report that AI is not eliminating as many jobs as experts have predicted. … Take CEO ...
This week, Cisco patches and hacks. Trojanized app targeted Israelis. Bye-bye, Tycoon 2FA. Also bye-bye LeakBase. A ...
Google Threat Intelligence Group (GTIG) tracked 90 zero-day vulnerabilities actively exploited throughout 2025, almost half of them in enterprise software and appliances.
The Register on MSN
Spyware disguised as emergency-alert app sent to Israeli smartphones
Steals SMS messages, location data, contacts … and delivers it to Hamas-linked crew Hamas-linked attackers are dropping spyware disguised as an emergency-alert app on Israelis' smartphones via SMS ...
Chinese state hackers and spyware vendors are fueling a rise in zero-day attacks, which increasingly target enterprise software and devices — security and networking products in particular.
North Korean hackers are deploying newly uncovered tools to move data between internet-connected and air-gapped systems, spread via removable drives, and conduct covert surveillance.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results