Mobile SecuritySecurity Operation Triangulation: iOS devices targeted with previously unknown malware by admin December 31, 2025 by admin December 31, 2025 UPD 23.04.2025: MITRE created a page for Operation Triangulation as part of its ATT&CK… 0 FacebookTwitterPinterestEmail
PhishingSecurity Webrat, disguised as exploits, is spreading via GitHub repositories by admin December 23, 2025 by admin December 23, 2025 In early 2025, security researchers uncovered a new malware family named Webrat. Initially, the… 0 FacebookTwitterPinterestEmail
PhishingSecurity A vehicle’s head unit hacked via its modem by admin December 16, 2025 by admin December 16, 2025 Introduction Imagine you’re cruising down the highway in your brand-new electric car. All of… 0 FacebookTwitterPinterestEmail
PhishingSecurity Attacks on Kaspersky honeypots exploit CVE-2025-55182 by admin December 11, 2025 by admin December 11, 2025 On December 4, 2025, researchers published details on the critical vulnerability CVE-2025-55182, which received… 0 FacebookTwitterPinterestEmail
PhishingSecurity Analyzing the vulnerability landscape in Q3 2025 by admin December 3, 2025 by admin December 3, 2025 In the third quarter, attackers continued to exploit security flaws in WinRAR, while the… 0 FacebookTwitterPinterestEmail
PhishingSecurity How NTLM is being abused in 2025 cyberattacks by admin November 26, 2025 by admin November 26, 2025 Just like the 2000s Flip phones grew popular, Windows XP debuted on personal computers,… 0 FacebookTwitterPinterestEmail