Endpoint Security

Satellite Signal Interruption Causes Porsche Immobilization in Russia
Cybersecurity
Satellite Signal Interruption Causes Porsche Immobilization in Russia
Hundreds of Porsches in Russia became immobile due to satellite communication issues, sparking fears of a hack. However, Porsche asserts no breach occurred and their ...
Equixly Secures $11 Million Investment to Enhance API Penetration Testing Capabilities
Cybersecurity
Equixly Secures $11 Million Investment to Enhance API Penetration Testing Capabilities
Equixly has successfully raised $11 million to bolster its API penetration testing services by developing proprietary AI models, expanding globally, and recruiting new team members.
GlobalProtect Logins and SonicWall APIs Come Under Fire from Hacking Campaign
Endpoint Security
GlobalProtect Logins and SonicWall APIs Come Under Fire from Hacking Campaign
A sophisticated hacking campaign launched on December 2, 2025, is targeting Palo Alto's GlobalProtect portals and SonicWall's SonicOS API endpoints. Involving over 7,000 IPs linked ...
ASUS Confirms Third-party Breach as Everest Ransomware Group Strikes
Endpoint Security
ASUS Confirms Third-party Breach as Everest Ransomware Group Strikes
ASUS has verified a disruption resulting from a third-party breach. The Everest ransomware group has claimed responsibility, asserting they compromised companies like ASUS, ArcSoft, and ...
Google Expands Support for Android's In-Call Scam Protection to More Financial Institutions
Cybersecurity
Google Expands Support for Android’s In-Call Scam Protection to More Financial Institutions
In a significant move to bolster in-call scam protection, Google is expanding its Android feature to include multiple financial institutions in the United States. This ...
Albiriox Banking Trojan Poses New Threat to Android Devices
Cybersecurity
Albiriox Banking Trojan Poses New Threat to Android Devices
Cybersecurity experts are on high alert with the emergence of Albiriox, an Android banking trojan sold for $720 monthly. This new threat from Russian cybercriminals ...
ClickFix Attacks Use Poisoned PNG Files to Deliver Malicious Code
Cybersecurity
ClickFix Attacks Use Poisoned PNG Files to Deliver Malicious Code
A novel ClickFix attack method leverages fake Windows update prompts and malformed PNG files to deploy infostealer malware. This campaign seeks to exploit user trust ...
Android Trojan Sturnus Defeats Encrypted Messaging Apps with On-Screen Capture
Application Security
Android Trojan Sturnus Defeats Encrypted Messaging Apps with On-Screen Capture
The new Android malware dubbed Sturnus bypasses strong encryption in secure messaging apps by recording on-screen content and enabling full device control.
Operation WrtHug Compromises ASUS Routers in Global Botnet Expansion
Endpoint Security
Operation WrtHug Compromises ASUS Routers in Global Botnet Expansion
Operation WrtHug is hijacking tens of thousands of outdated ASUS routers worldwide by exploiting old firmware flaws and default credentials. The botnet is growing rapidly, ...
ShadowRay 2.0 Botnet Campaign Exploits Ray Clusters for Cryptomining
Endpoint Security
ShadowRay 2.0 Botnet Campaign Exploits Ray Clusters for Cryptomining
ShadowRay 2.0 is exploiting an unauthenticated RCE flaw in older Ray Cluster deployments, infecting more than 5,000 exposed nodes and turning them into a self-spreading ...