A fake CAPTCHA scam is tricking Windows users into running PowerShell commands that install StealC malware and steal passwords, crypto wallets, and more.
CRESCENTHARVEST uses protest lures and malicious LNK files to deploy RAT malware targeting Iran protest supporters for espionage and data theft.
Amazon is warning that a Russian-speaking hacker used multiple generative AI services as part of a campaign that breached more than 600 FortiGate firewalls across 55 countries in five weeks.
Attackers are running paid Facebook ads that look like official Microsoft promotions, then directing users to near-perfect ...
UTC on January 22, 2026, Nike appeared on WorldLeaks’ Tor-based leak site. The countdown timer showed 48 hours until 1.4 terabytes — 188,347 files — would be dumped onto the dark web for anyone to ...
Your SSD may be hiding errors, and you won't know until it's too late ...
Microsoft is gearing up for big PowerShell and Windows OpenSSH changes in 2026, but security will come before flashy new features.
By typing simple, text-based commands into Windows' PowerShell, you can quickly install apps directly from the Microsoft ...
Microsoft Edge Secure Network VPN promises built-in privacy, but a security researcher says it behaves like a browser proxy than a full VPN.
Self-hosted agents execute code with durable credentials and process untrusted input. This creates dual supply chain risk, ...
Cybersecurity has always been a game of adaptation, but the emergence of AI-driven polymorphic threats is accelerating that arms race.
Attila covers software, apps and services, with a focus on virtual private networks. He's an advocate for digital privacy and has been quoted in online publications like Computer Weekly, The Guardian, ...