Introduction On March 4, 2026, Google and iVerify published reports about a highly sophisticated…
Tag:
Vulnerabilities and exploits
-
-
The fourth quarter of 2025 went down as one of the most intense periods…
-
Mobile SecuritySecurity
Operation Triangulation: iOS devices targeted with previously unknown malware
UPD 23.04.2025: MITRE created a page for Operation Triangulation as part of its ATT&CK…
-
In early 2025, security researchers uncovered a new malware family named Webrat. Initially, the…
-
Introduction Imagine you’re cruising down the highway in your brand-new electric car. All of…
-
On December 4, 2025, researchers published details on the critical vulnerability CVE-2025-55182, which received…
-
In the third quarter, attackers continued to exploit security flaws in WinRAR, while the…
-
Just like the 2000s Flip phones grew popular, Windows XP debuted on personal computers,…
