Phishing surge, LinkedIn tracking claims, spyware use, and rising stealers expose growing abuse of trusted systems.
M stolen after six-month DPRK social engineering campaign began fall 2025, exposing Drift’s contributors and cloud assets.
Now a security researcher says a Reader hole has been quietly exploited by malware for as long as four months, fingerprinting ...