#cybersecurity-threat

[ follow ]
Information security
fromArs Technica
7 hours ago

Hundreds of millions of iPhones can be hacked with a new tool found in the wild

DarkSword, a sophisticated iPhone hacking technique discovered in use by Russian hackers, can silently compromise hundreds of millions of iOS devices running older operating system versions through infected websites.
Information security
fromTheregister
8 hours ago

Unknown attackers exploit another critical SharePoint bug

Unknown attackers are actively exploiting CVE-2026-20963, a critical Microsoft SharePoint deserialization vulnerability that enables unauthenticated remote code execution, prompting CISA to mandate federal agency patching within three days.
Apple
fromMail Online
14 hours ago

iPhone users warned as 'DarkSword' malware infects millions of devices

DarkSword malware exploits six iOS and Safari vulnerabilities to enable hackers to install malware on iPhones running iOS 18.4-18.7 through malicious websites, affecting hundreds of millions of devices.
Information security
fromMail Online
3 days ago

Urgent warning to all Gmail users over scam using security checks

A sophisticated scam mimics Google's security tool to steal Gmail credentials and device data through fake verification prompts and malicious PWA installation.
Cryptocurrency
fromTechRepublic
1 week ago

Fake Gemini AI Chatbot Promotes 'Google Coin' in New Crypto Scam

Scammers created a fake Google Gemini chatbot on a fraudulent website to pitch a non-existent cryptocurrency called 'Google Coin' and solicit irreversible crypto payments from victims.
Information security
fromThe Hacker News
1 week ago

Multi-Stage VOID#GEIST Malware Delivering XWorm, AsyncRAT, and Xeno RAT

A multi-stage malware campaign called VOID#GEIST uses obfuscated batch scripts to deliver encrypted RAT payloads including XWorm, AsyncRAT, and Xeno RAT through fileless execution techniques.
#cisco-vulnerability
fromDataBreaches.Net
3 weeks ago
Information security

Cisco says hackers have been exploiting a critical bug to break into big customer networks since 2023 - DataBreaches.Net

fromTechCrunch
3 weeks ago
Information security

Cisco says hackers have been exploiting a critical bug to break into big customer networks since 2023 | TechCrunch

fromDataBreaches.Net
3 weeks ago
Information security

Cisco says hackers have been exploiting a critical bug to break into big customer networks since 2023 - DataBreaches.Net

fromTechCrunch
3 weeks ago
Information security

Cisco says hackers have been exploiting a critical bug to break into big customer networks since 2023 | TechCrunch

Information security
fromThe Hacker News
3 weeks ago

Aeternum C2 Botnet Stores Encrypted Commands on Polygon Blockchain to Evade Takedown

Aeternum C2 botnet uses Polygon blockchain for command-and-control infrastructure, making it resistant to traditional takedown methods by storing instructions on immutable public ledgers.
Information security
fromTheregister
3 weeks ago

Google and friends disrupt suspected Beijing espionage op

Google disrupted UNC2814, a China-linked group conducting widespread cyberattacks on telecommunications and government organizations across multiple continents using Google Sheets API for command-and-control operations.
[ Load more ]