More Stories
Lumma Stealer Proliferation Fueled by Telegram Activity
Spreading malware via Telegram channels allows threat actors to bypass traditional detection mechanisms and reach a broad, unsuspecting audience Read...
A Fifth of UK Enterprises “Not Sure” If NIS2 Applies
Over a fifth of large UK businesses aren’t sure of their compliance responsibilities under the new NIS2 directive Read More
Five Charged in Scattered Spider Case
Five men have been indicted in connection with crimes committed by the Scattered Spider group Read More
Smashing Security podcast #394: Digital arrest scams and stream-jacking
In our latest episode we discuss how a woman hid under the bed after scammers told her she was under...
Five Privilege Escalation Flaws Found in Ubuntu needrestart
Five LPE flaws in Ubuntu’s needrestart utility enable attackers to gain root access in versions prior to 3.8 Read More
60% of Emails with QR Codes Classified as Spam or Malicious
60% of QR code emails are spam according findings from Cisco Talos, who also identified attackers using QR code art...