Scroll down for all the latest threat intelligence news and articles.
Subscribe to our weekly newsletter for the latest in industry news, expert insights, dedicated information security content and online events.
Android’s LSPosed-based attack hijacks payment apps via runtime manipulation and SIM-binding bypass
CursorJack shows how malicious MCP deeplinks in Cursor IDE can trigger user-approved code execution
A new law enforcement operation against phishing and ransomware operators led to the takedown of 45,000 malicious IP addresses
Huntress researchers uncover campaign exploiting vulnerabilities to steal data using Elastic Cloud as a data hub
Increased attempts to compromise surveillance cameras linked to Iran during Middle East conflict
Malware campaign uses Ukrainian email service for credibility, deploying "BadPaw" to execute attacks