Aeternum C2 Botnet Stores Encrypted Commands on Polygon Blockchain to Evade Takedown on February 26, 2026 Posted by The Hacker News
UAT-10027 Targets U.S. Education and Healthcare with Dohdoor Backdoor on February 26, 2026 Posted by The Hacker News
ThreatsDay Bulletin: Kali Linux + Claude, Chrome Crash Traps, WinRAR Flaws, LockBit & 15+ Stories on February 26, 2026 Posted by The Hacker News
Notorious ransomware gang allegedly blackmailed by fake FSB officer on February 26, 2026 Posted by Graham Cluley
Posted in Digital Security A slippery slope: Beware of Winter Olympics scams and other cyberthreats on February 2, 2026 WeLiveSecurity
Posted in Digital Security Drowning in spam or scam emails? Here’s probably why on January 27, 2026 WeLiveSecurity
Posted in Digital Security Old habits die hard: 2025’s most common passwords were as predictable as ever on January 20, 2026 WeLiveSecurity
Posted in Digital Security Credential stuffing: What it is and how to protect yourself on January 8, 2026 WeLiveSecurity
Posted in Digital Security How password managers can be hacked – and how to stay safe on November 13, 2025 WeLiveSecurity
Posted in Digital Security AI-aided malvertising: Exploiting a chatbot to spread scams on October 13, 2025 WeLiveSecurity
Posted in Digital Security Black Hat USA 2025: Policy compliance and the myth of the silver bullet on August 7, 2025 WeLiveSecurity
Posted in Digital Security Black Hat USA 2025: Does successful cybersecurity today increase cyber-risk tomorrow? on August 7, 2025 WeLiveSecurity
Posted in Digital Security The hidden risks of browser extensions – and how to stay safe on July 29, 2025 WeLiveSecurity
Posted in Digital Security Rogue CAPTCHAs: Look out for phony verification pages spreading malware on July 24, 2025 WeLiveSecurity