Have you ever wondered why your child keeps asking for money to buy things in their favorite game? If so, you're not alone. Many parents find themselves caught off guard by the world of loot boxes and in-game purchases. Loot boxes and in-game purchases, while adding...
WhatsApp has addressed a vulnerability used in mercenary spyware attacks on high-profile targets. The Citizen Lab has published an investigation into the Israeli developer of surveillance software, Paragon Solutions, “to untangle multiple threads connected to the...
The TikTok Blackout Challenge, also known as the "choking game" or "pass-out challenge," is a highly dangerous trend that involves cutting off oxygen to the brain to induce a brief, euphoric sensation. Participants often choke themselves or have someone else apply...
If you work in real estate, you are likely relying more on digital tools for online listings, virtual property tours, and electronic payments and contracts. While these technologies make transactions faster and easier, they also expose your clients' sensitive personal...
In the ever-evolving landscape of advanced persistent threats (APTs), the notorious financial cybercrime group FIN7 has added another sophisticated tool to their arsenal. We have recently discovered a new Python-based backdoor, called “AnubisBackdoor”, being deployed...
A security researcher has discovered that the websites of over 100 car dealerships have been compromised in a supply-chain attack that attempted to infect the PCs of internet visitors. As researcher Randy McEoin explains in a blog post, cybercriminals infected the...