Author: wordpress

Sui Cetus DEX Hit By Suspected $200M Hack

Massive Breach: Cetus DEX on Sui Suffers Potential $200M Hack Cetus Protocol, a leading decentralized exchange (DEX) and… The post Sui Cetus DEX Hit By Suspected $200M Hack appeared first on Hackers Online Club. This article has been indexed from…

Datenschutz: Nutzer können sich an Sammelklage gegen X beteiligen

Niederländische Verbraucherschützer reichen in Deutschland Klage gegen X ein – Nutzer können sich der Klage über ein Formular anschließen. (X, Datenschutz) Dieser Artikel wurde indexiert von Golem.de – Security Lesen Sie den originalen Artikel: Datenschutz: Nutzer können sich an Sammelklage…

TAG-110 Hackers Weaponize Word Templates for Targeted Attacks

A sophisticated cyber-espionage campaign has emerged targeting Tajikistan’s government institutions through weaponized Microsoft Word templates, marking a significant tactical evolution by the Russia-aligned threat group TAG-110. The campaign, which unfolded between January and February 2025, represents a departure from the…

iPhone Phishing Defense – Recognizing and Blocking Attacks

As mobile devices become increasingly central to daily life, cybercriminals are refining their tactics to exploit vulnerabilities in Apple’s iMessage platform. Recent reports reveal a surge in phishing campaigns that bypass Apple’s built-in security measures by manipulating user behavior, underscoring…

Protecting iPhones from Spyware – Tools and Tips

iPhones have become integral to daily life, so their security has never been more critical. While Apple’s iOS is renowned for its robust security architecture, spyware threats are evolving, and no device is entirely immune. Recent incidents, including high-profile cases…

Threat Actors Deliver Winos 4.0 Impersonate as VPN & QQBrowser

A sophisticated malware campaign leveraging fake software installers disguised as popular applications has emerged as a significant threat to cybersecurity infrastructure, with attackers deploying the hard-to-detect Winos 4.0 malware through deceptive VPN and QQBrowser installations. The campaign represents a concerning…

Securing Android in the Enterprise – Policies and Solutions

Recent security vulnerabilities in Google’s Android operating system have highlighted the critical importance of robust enterprise mobile security strategies. Just days ago, on May 11, 2025, security researchers identified multiple vulnerabilities in the Android OS, with the most severe potentially…