Cybersecurity firm Group-IB found the DeadLock ransomware is exploiting Polygon smart contracts to create a resilient ...
A sophisticated, cross-platform keylogger written in Python with advanced features including AES-256 encryption, silent background operation, automatic startup/restart capabilities, and daily log ...
A high-severity security flaw has been disclosed in MongoDB that could allow unauthenticated users to read uninitialized heap memory. The vulnerability, tracked as CVE-2025-14847 (CVSS score: 8.7), ...
In dense RFID systems, where numerous readers and tags operate simultaneously in close proximity, securing reader-to-reader communication is essential to prevent attacks such as eavesdropping and ...
It's getting harder to tell where normal tech ends and malicious intent begins. Attackers are no longer just breaking in — they're blending in, hijacking everyday tools, trusted apps, and even AI ...
Stealka malware steals logins and crypto keys from 100+ browsers and 80+ wallets, including MetaMask, Coinbase, and Trust Wallet. Kaspersky has warned users about a new malware threat called Stealka ...