More than half of all fake shop attacks in 2025 occurred in Q4 as Kiwis were increasingly exposed to scams spread through ads, feeds and video.
A sophisticated phishing campaign impersonating WhatsApp Web uses fake meeting links and QR codes to hijack accounts and ...
Active malware exploits DLL side-loading in a signed GitKraken binary to deliver trojans, stealers, and remote access malware ...
Fake weather images and videos are all over social media and the Internet. Here are 5 ways to spot them and prevent them from ...
From insider recruitment and AI-powered investment scams to LLM reconnaissance and QR code phishing, Cybernews’s new security ...
Selling online? Watch out for the Google Voice scam. If a buyer asks for a 6-digit code to 'verify' you, it's a trap. Here is ...
Unknown red-headed actor Scott Rose-Marsh reportedly auditioned to play James Bond. The whole story was a hoax.
This week, Moody's said firewalls will be obsolete, Romanian critical infrastructure hacked, Sedgwick breach and a D-Link DSL ...
Cybercriminals use ErrTraffic tool to automate malware distribution through fake browser error messages, with attacks ...
The Windows Blue Screen (or Black Screen) of Death is typically a sign that some unrecoverable error or conflict has occurred. Now, cybercriminals are using the dreaded BSOD as a way to trick people ...
Learn how to spot fake online casinos, avoid scam bonuses, verify licences, and protect your money with clear warning signs ...
Threat actors are using the social engineering technique to deploy the DCRat remote access Trojan against targets in the hospitality sector.