Hackers are using AI-generated video calls to impersonate trusted contacts and trick crypto workers into installing malware.
This “dream wish list for criminals” includes millions of Gmail, Facebook, banking logins, and more. The researcher who ...
An analysis of 6 billion credentials leaked in 2025 confirms that poor password hygiene persists, putting enterprises at risk ...
The ShinyHunters extortion gang claims it is behind a wave of ongoing voice phishing attacks targeting single sign-on (SSO) ...
A security researcher uncovered an exposed online database that was stockpiling user information likely collected via malware ...