by Beck Bailey | Apr 1, 2026 | RSS
A new malicious kit called EvilTokens integrates device code phishing capabilities, allowing attackers to hijack Microsoft accounts and provide advanced features for business email compromise attacks. […]
by Beck Bailey | Apr 1, 2026 | RSS
A new Android malware named NoVoice was found on Google Play, hidden in more than 50 apps that were downloaded at least 2.3 million times. […]
by Beck Bailey | Apr 1, 2026 | RSS
The Computer Emergency Response Team of Ukraine (CERT-UA) has disclosed details of a new phishing campaign in which the cybersecurity agency itself was impersonated to distribute a remote administration tool known as AGEWHEEZE. As part of the attacks, the threat...
by Beck Bailey | Apr 1, 2026 | RSS
Iran has threatened multiple US tech giants in the Middle East, escalating tensions and raising fears of AI-driven warfare turning physical. The post Iran Threatens to Attack Apple, Google, and Other US Tech Firms in Middle East appeared first on...
by Beck Bailey | Apr 1, 2026 | RSS
Hackers are using WhatsApp messages to deliver malware to Windows PCs, exploiting user trust and attachments to trigger stealthy, multi-stage attacks. The post Microsoft: Hackers Are Using WhatsApp to Deliver Malware to Windows PCs appeared first on...
by Beck Bailey | Apr 1, 2026 | RSS
Modern intrusions increasingly start with valid credentials and routine access, not exploits. Blackpoint Cyber’s upcoming threat report shows how VPN abuse, RMM tools, and social engineering drive most incidents. […]
Recent Comments