News
Trends in open-source software supply chain attacks – ones that exploit the public platforms developers rely on for software development – have changed quite a bit in recent years. While the number of ...
A DPRK-linked group is using fake job sites and Python malware to infiltrate Windows systems of blockchain professionals — ...
A new cybersecurity campaign has exposed 67 trojanized GitHub repositories, targeting gamers and developers with malicious ...
Malware campaign abuses Cloudflare Tunnel and phishing lures to deliver in-memory RATs across multiple regions.
Discovered by ReversingLabs, the campaign reflects a shift in open-source software supply chain attacks. While overall ...
A threat actor is abusing Cloudflare Tunnels for the delivery of a Python loader as part of a complex infection chain.
Attackers use typo-squatting, obfuscation, and fake accounts to slip Python-based malware into open-source projects, raising ...
Microsoft Edit is a first-of-its-kind command line text editor for Windows which supports advanced editing beyond the Notepad ...
A new Python-based remote access Trojan (RAT) known as PylangGhost is being deployed in cyber campaigns attributed to the ...
Fog ransomware hackers are using an uncommon toolset, which includes open-source pentesting utilities and a legitimate ...
1d
Cryptopolitan on MSNNorth Korean hackers target crypto job seekers with malwareNorth Korean hackers lured crypto professionals with fake job interviews to deploy new Python-based malware, PylangGhost.
Blue Team playbooks are essential—but tools like Wazuh take them to the next level. From credential dumping to web shells and ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results