Hacker
-
Posted: March 25, 2026Views: 31Read moreA phishing campaign uses fake resume files to infect enterprise systems with credential stealers and crypto miners, targeting corporate networks with advanced malware.
-
Read moreFBI and CISA warn of Russian-linked phishing attacks targeting WhatsApp and Signal users to steal accounts using fake support messages and verification code scams.
-
Read moreResearchers warn that indirect prompt injection attacks allow hackers to manipulate AI agents using hidden instructions in web pages, enabling phishing, data theft, and system compromise.
-
Read moreA new phishing campaign targeting LastPass users uses fake support emails, display name spoofing, and fraudulent login pages to steal vault master passwords.
-
Read moreChina-linked Lotus Blossom group breached Notepad++ hosting, delivering Chrysalis backdoor via tampered updates. Learn the attack details and how to stay safe.
-
Read moreDiscover how hackers use 'rn' instead of 'm' in fake Microsoft domains to steal logins via phishing. Learn common typosquatting tricks and how to stay safe online.
-
Read morePhishing scams with fake invoices deploy XWorm—learn the tactics, risks, and defenses to avoid credential theft and ransomware.
-
Posted: November 14, 2025Views: 140Read morePhishing scams trick iPhone owners into giving up Apple IDs—learn the tactics, risks, and tips to secure your device and account.
-
Read moreZoom vulnerabilities allow unauthorized access—learn about the CVEs, risks, and urgent update needs to secure your video calls.