Dustin Kirkland of Chainguard explains how verified, hardened components and AI-powered automation can prevent malware ...
Two malicious packages with nearly 8,500 downloads in Rust's official crate repository scanned developers' systems to steal ...
The attackers used process hollowing against RegAsm.exe, patched Windows defenses such as AMSI and ETW and unpacked further ...
ZachXBT documents North Korean IT workers infiltrating crypto companies in over 25 instances for hacks and extortion schemes.
PyPI, the default platform for Python's package management tools, is warning users of a fresh phishing campaign.
ESET researchers reveal how malware operators collaborate with covert North Korean IT workers, posing a threat to both headhunters and job seekers.
New DDoS botnet ShadowV2 targets misconfigured Docker containers and offers a service model where customers launch their own ...
In essence, MalTerminal is a malware generator. When adversaries bring it up, it asks if they want to create a ransomware ...
Binance founder CZ Zhao issued urgent warnings about North Korean hackers infiltrating crypto companies through fake job ...
ClickFix typically asks the victim to perform a fake CAPTCHA test. FileFix tricks the user into copying and pasting a command ...
Qix is an open source maintainer account that was compromised by a phishing attack. This allowed attackers to infect 18 popular npm packages with malicious code. Together, these packages are ...
Anthropic has released a new threat intelligence report outlining how cybercriminals are misusing advanced AI models for large-scale extortion, fraudulent employment schemes, and even ransomware ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results