SecureList recently published a study of Android and iOS apps that have been laced with a malicious software development kit (SDK) dubbed "SparkCat" that steals crypto wallet recovery phrases.
The Chinese market is the second largest in the world with an estimated GDP of $18 trillion. Over the past few decades, it has grown to be a powerhouse of manufacturing and technology. This has been coupled with a large increase in the internet penetration that now stands at 76%, which for a country of 1.4 billion people is a significant number of people online.
A recent influx of /16 IPv4 address blocks has sent ripples through the secondary market, triggering a notable decline in average sale prices for the largest address sizes. According to data from IPv4.Global's March 2025 report, average prices for /16 blocks have fallen from nearly $50 per address in mid -- 2024 to just over $24 by March 2025.
Amazon was a major player in ICANN's last top-level domain (TLD) expansion round, serving as a Registry Operator for over 50 TLDs based on over 70 strings for which they originally applied.
Ransomware attacks have been plaguing individual users and organizations worldwide for years now. And that is not surprising because they work. In fact, ransomware victims were asked to pay an average of US$2.5 million in 2024.
Trend Micro researchers recently uncovered a search engine optimization (SEO) manipulation campaign targeting users of Internet Information Services (IIS) with BadIIS.
The transition to IPv6 has reached a significant milestone in the United States. As of February 9, 2025, more than half of all traffic to Google's services from U.S. users is now conducted over IPv6. This marks a step forward for a country with deep historical ties to the Internet but one that still lags behind several others in adoption rates.
Microsoft and Google almost always land on the list of most-phished brands, and that is not surprising given their huge market presence. And phishers are often the most likely threat actors to bank on the brands' popularity for the success of their attacks.
Sneaky 2FA, believed to be sold via the phishing-as-a-service (PhaaS) business model, recently figured in an adversary-in-the-middle (AitM) attack targeting Microsoft 365 users. Marketed as Sneaky Log by a full-featured bot on Telegram, Sneaky 2FA reportedly used fake Microsoft authentication pages with automatically filled-in email address fields to add to its sense of authenticity.
The extension includes custom features in terms of location and size on your browser and links directly to the IPv4.Global marketplace if something scrolls by that interests you.