Suspected high-ranking members of one of the world's largest online marketplaces for leaked data have been arrested by French police. According to local media reports, French cybercrime cops detained four prominent members of the BreachForums site. The suspects - who...
The Pi2Day event, celebrated June 28, is a highly anticipated moment for the Pi Network community, traditionally marked by feature launches, development updates, and platform milestones. This year, though, the celebration has attracted cybercriminals, who are running...
Cybercriminals are once again exploiting Facebook’s ad platform in a malicious campaign that lures users into downloading malware under the guise of resolving fake account problems. This time, they’re using brands like Binance and TradingView to grab the attention of...
A vulnerability in Notepad++ could let attackers gain SYSTEM-level privileges through a simple local exploit. Critical installer bug leaves systems exposed A newly identified vulnerability in version 8.8.1 of Notepad++ , the popular text and source code editor, has...
Call spoofing is a scam tactic threat actors use to disguise the origin of a phone call. Understanding how it works could help you detect and avoid it. What is call spoofing? Caller ID spoofing is the practice of obfuscating the origin of a phone call by falsifying...
A ransomware attack on Synnovis, a key pathology services provider for the UK’s National Health Service, has been officially linked to a patient's death, underscoring the risks cyberattacks pose to healthcare systems. In June 2024, the ransomware group Qilin targeted...