North Korean hackers abuse Visual Studio Code task files in fake job projects to deploy backdoors, spyware, and crypto miners ...
CERT-UA reports PLUGGYAPE malware attacks targeting Ukrainian defense forces via Signal and WhatsApp, using phishing links ...
The phishing campaign shows how attackers continue to weaponize legitimate cloud services and open source tools to evade ...
A new Android banking trojan called Sturnus is shaping up to be one of the most capable threats we have seen in a while. It is still in early development, but it already behaves like a fully mature ...
Back in February 2025, several media outlets warned of a new threat targeting users of Google’s Gmail email service. Attackers used AI technology to perfect phishing emails and make them look more ...
Emily Long is a freelance writer based in Salt Lake City. After graduating from Duke University, she spent several years reporting on the federal workforce for Government Executive, a publication of ...
Ben Khalesi writes about where artificial intelligence, consumer tech, and everyday technology intersect for Android Police. With a background in AI and Data Science, he’s great at turning geek speak ...
Apple has officially launched iOS 26.1, delivering a robust package of new features, performance improvements, and critical security updates. This release is designed to enhance both the functionality ...
GhostCall and GhostHire use fake investor meetings and bogus recruiter tests to deliver cross-platform malware to blockchain and Web3 professionals. North Korea-aligned threat actor BlueNoroff, also ...
North Korea-linked threat actors are escalating their cyber operations using decentralized and evasive malware tools, according to new findings from Cisco Talos and Google Threat Intelligence Group.
North Korea's Famous Chollima uses EtherHiding to hide malware in smart contracts on BNB Chain and Ethereum posing as job recruiters as regime stole $1.3B across 47 incidents in 2024 and $2.2B in H1 ...