Security News
Threat actors use beta apps to bypass mobile app store security
![](https://www.bleepstatic.com/content/hl-images/2022/02/25/android-smartphone.jpg)
Sites scramble to block ChatGPT web crawler after instructions emerge
![](https://cdn.arstechnica.net/wp-content/uploads/2023/08/hiding_hero_1-760x380.jpg)
EvilProxy Cyberattack Flood Targets Execs via Microsoft 365
![](https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt49a1d2053188064c/62e97e6d4d9e7a6c51fed368/phishing_lure_Philip_Steury_Alamy.jpg)
Gafgyt malware exploits five-years-old flaw in EoL Zyxel router
![](https://www.bleepstatic.com/content/hl-images/2022/11/30/botnet.jpg)
Rhysida Ransomware Trains Its Sights on Healthcare Operations
![](https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/bltdf2e8a4da734315f/60b1e7ff4e7eb868c4c6a23f/digitalhealthcare_metamorworks-AdobeStock.jpg)
EvilProxy phishing campaign targets 120,000 Microsoft 365 users
![](https://www.bleepstatic.com/content/hl-images/2022/07/22/Microsoft_365.jpg)
Hackers use open source Merlin post-exploitation toolkit in attacks
![](https://www.bleepstatic.com/content/hl-images/2023/04/11/hacker-and-screens.jpg)
New BitForge cryptocurrency wallet flaws lets hackers steal crypto
![](https://www.bleepstatic.com/content/hl-images/2023/08/09/bitcoin-blockchain.jpg)
QakBot Malware Operators Expand C2 Network with 15 New Servers
Author discovers AI-generated counterfeit books written in her name on Amazon
![](https://cdn.arstechnica.net/wp-content/uploads/2023/08/AI_spew_hero_crop-760x380.jpg)