A fake website impersonating Avast antivirus is tricking people into infecting their own computers. The site looks legitimate, runs what appears to be a virus scan, and claims your system is full of threats. But the results are fake: when you’re prompted to “fix” the problem, the download you’re given is actually Venom Stealer—a type […]
Read MoreOne of the world’s most extraordinary golfing experiences is back. The legendary Extreme 19th, located at the renowned Legend Golf & Safari Resort, is officially re-opening on the 7th of May, inviting golfers and adventure seekers to once again take on the most dramatic par-3 in the world of golf.
Read MoreMore than half of U.S. leisure travelers now use artificial intelligence to plan, book or navigate their trips, according to new research from Phocuswright, signaling the fastest behavioral shift the travel industry has seen in ten years. Phocuswright’s new report – The AI Surge: Travel’s Fastest Behavioral Shift in a Decade – shows that 56% […]
Read MoreMulti-day tour operators worldwide are entering a new phase of growth marked by rising demand for small-group travel and accelerating adoption of AI, according to The State of Multi-Day Tours, 2nd Edition, a new global research report from Arival. The findings come as the sector prepares to gather at Arival 360 Valencia, the company’s flagship […]
Read MoreJacada Travel, a leader in positive impact luxury travel, has launched a new initiative designed to scale the company’s commitment to positive impact through targeted, high-impact projects. Starting March 16, 2026, Jacada will contribute $20 per person per trip directly to its newly established Impact Fund.
Read MoreA previously undocumented macOS infostealer has surfaced during our routine threat hunting. We initially tracked it as NukeChain, but shortly before publication, the malware’s operator panel became publicly visible, revealing its real name: Infiniti Stealer. This malware is designed to steal sensitive data from Macs. It spreads through a fake CAPTCHA page that tricks users […]
Read MoreGlassWorm hides inside developer tools. Once it’s in, it steals data, installs remote access malware, and even a fake browser extension to monitor activity. While it starts with developers, the impact can quickly spread. With stolen credentials, access tokens, and compromised tools, attackers can launch wider supply chain attacks, putting companies and everyday users at […]
Read MoreMeta faced two major legal setbacks this week as courts in New Mexico and California both found the company liable for harm to children. A New Mexico jury just ordered Meta to pay $375 million for misleading parents about child safety on Instagram and Facebook. Jurors found the company violated consumer protection laws by claiming […]
Read MoreA significant proportion of cyber incidents are linked to supply chain attacks, and this proportion is constantly growing. Over the past year, we have seen a wide variety of methods used in such attacks, ranging from creation of malicious but seemingly legitimate open-source libraries or delayed attacks in such seemingly legitimate libraries, to the simplest […]
Read MoreIntroduction On March 4, 2026, Google and iVerify published reports about a highly sophisticated exploit kit targeting Apple iPhone devices. According to Google, the exploit kit was first discovered in targeted attacks conducted by a customer of an unnamed surveillance vendor. It was later used by other attackers in watering-hole attacks in Ukraine and in […]
Read More