Saturday, November 15, 2025

Cybersecurity

Phishing Campaign Uses Fake CAPTCHA to Deliver Lumma Stealer Malware

Cybercriminals have unveiled a highly deceptive method of spreading the Lumma Stealer malware, leveraging counterfeit CAPTCHA verification pages to bypass user defenses and distribute...

The UK Areas Most at Risk of Online Shopping Scams

A new research has revealed the UK areas most at risk of online shopping scams this New Year, with Bedfordshire coming out on top. The...

Hackers Exploit Official Company Documents to Spread Malware

Cybercriminals have found a new way to exploit trust, using official company documents to trick users into downloading malware. This alarming discovery was unveiled by...

NordLayer Introduces Malware Detection Tool to Protect Businesses from Cyber Threats

NordLayer, a leading provider of secure remote access and encrypted connections, has unveiled a new feature called Download Protection. This tool is designed to...

T-Mobile Admits Chinese Hackers Accessed Network, But Call Logs Remain Safe

T-Mobile has confirmed that Chinese hackers recently targeted its infrastructure, but assured customers that no sensitive data, including call logs, was compromised. The incident, which...

Ford Denies Data Breach Allegations: Customer Information Secure

Ford Motor Company has firmly dismissed claims of a recent data breach, stating that its systems and customer data remain uncompromised. The alleged breach, which...

Maxar Data Breach Exposes Sensitive Employee Information

A recent cyberattack targeting Maxar Space Systems has compromised sensitive personal information of employees, as revealed in a filing with the California Attorney General. The...

North Korean Hackers Target macOS Users with Flutter-Based Malware in New Cybersecurity Experiment

Cybersecurity researchers at Jamf have uncovered a unique and experimental malware targeting macOS users, which they believe was developed by North Korean state-sponsored hackers. This...