Millions installed 'productivity' Chrome extensions that became malware after acquisition. Here's how browser extensions became enterprise security's weakest link.
TriZetto Provider Solutions, a healthcare IT company that develops software and services used by health insurers and ...
A sophisticated cyberattack is targeting Israeli civilians, exploiting a trusted emergency app. Hackers are distributing a fake 'Red Alert' application, disguised as an update from the Home Front ...
Smartphone users often download apps instantly whenever they need a new feature or service. Whether it’s a game, calling app, ...
IntroductionThreat actors often take advantage of major global events to fuel interest in their malicious activities. Zscaler ThreatLabz is diligently tracking a surge in cybercriminal activity that ...
A popular WP plugin can be abused to take over websites and thousands of sites are vulnerable.
A video allegedly depicting a couple indulging in explicit acts is called the so called 19 minute, 34 second video, but it is not clear where the clip was obtained. It remains controversial whether ...
Fake Spotify vote texts are stealing social media logins. Here’s how the scam works and how to protect your accounts today.
Avira antivirus vulnerabilities, Transport for London data breach affects 10 million, Gaming cheat exposes North Korean hacker.