A Hong Kong court has ruled that two Tiananmen vigil activists have a case to answer over calls to “end one-party rule” in China in a subversion trial under the Beijing-imposed national security law.
A dubious link from a friend. A headline too sensational to be true. A video that seems fake but you can't be sure. As online ...
Threat actors are employing a new variation of the ClickFix social engineering technique called InstallFix to convince users ...
Attackers are using fake Claude Code install pages and malicious search ads to spread infostealer malware targeting Windows and macOS systems.
The Contagious Interview campaign weaponizes job recruitment to target developers. Threat actors pose as recruiters from crypto and AI companies and deliver backdoors such as OtterCookie and ...
The Minister of Information and National Orientation, Mohammed Idris, on Saturday warned that fake news and digital disinformation pose a grave threat to Nigeria’s moral foundation and long-term ...
Fake videos and images depicting fake attacks and fake troops have racked up tens of millions of views on social media platforms in the nearly two weeks since the Iran war began.
Your weekly cybersecurity roundup covering the latest threats, exploits, vulnerabilities, and security news you need to know.
Artificial intelligence detectors are increasingly used to check the veracity of content online. We ran more than 1,000 tests and found several strengths and plenty of weaknesses. By Stuart A.
Researchers say they’ve discovered a supply-chain attack flooding repositories with malicious packages that contain invisible code, a technique that’s flummoxing traditional defenses designed to ...
If you use an Android phone, this deserves your attention. Cybersecurity researchers warn that hackers are using Hugging Face, a popular platform for sharing artificial intelligence (AI) tools, to ...