Hackers working for Iran’s government are using Telegram in hacking operations that use malware to target dissidents, ...
Plus: A porn-quitting app exposed the masturbation habits of hundreds of thousands of users, Russian hackers are trying to ...
The Justice Department announced the seizure of four domains as part of an ongoing effort to disrupt hacking and transnational repression schemes conducted by the Islamic Republic of Iran’s Ministry ...
New evidence suggests the recent attack targeting Stryker involved compromised credentials obtained via infostealer malware.
Trivy supply chain attack pushed malicious Docker images on March 22, enabling credential theft and worm spread, impacting ...
Russian-linked phishing hits thousands of messaging accounts via fake support tactics, enabling impersonation and data access ...
Iran-backed cyber groups are escalating operations in response to new U.S.–Israel military actions, putting small and midsize ...
One of the seized sites had posted screenshots of Stryker's internal IT systems. However, the hacking group Handala is ...
Amazon users are always a prime target for hackers, every pun intended, although it is usually phishing attacks that make the headlines. But what if I were to tell you that your Kindle could be used ...
Concerns about code vulnerabilities are fading in the crypto space, but more sophisticated scam tactics are emerging as protocol security improves. Crypto hackers stole $3.3 billion in 2025, but the ...
When you think of cyberattacks that compromise your account security, maybe you envisage Microsoft zero-day vulnerabilities being exploited in your software, or perhaps a hacker using ...
Add Yahoo as a preferred source to see more of our stories on Google. Muleshoe, population 5,000, sits in the Texas Panhandle, next to the New Mexico state line, and about as far away from Ukraine as ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results