
A newly disclosed Bluetooth vulnerability has raised serious privacy concerns for users of wireless headphones, earbuds, and speakers. Security researchers have found that a flaw in the Google Fast Pair system can allow attackers to silently connect to nearby Bluetooth audio devices, track their location, and even listen through built-in microphones, all without the owner’s […]
A China-linked hacking group has expanded a long-running cyber-espionage campaign against telecom providers by exploiting known vulnerabilities in edge networking devices. This breach highlights growing risks to telecommunications security and the critical need for stronger defenses in global network infrastructure. The recent incidents involving China-linked Hackers Breach Telecom Networks underscore these threats. Security teams at […]
A new WhatsApp-based malware campaign is actively spreading Astaroth, a well-known banking trojan, by abusing user trust and contact lists. The attack uses malicious ZIP files sent directly through WhatsApp chats, allowing the malware to propagate automatically from one victim to another. Once a user opens the ZIP file and runs the embedded content, the […]