News
Threat actors are adopting Rust for malware development. RIFT, an open-source tool, helps reverse engineers analyze Rust ...
Use of the ClickFix attack vector has shot up by 517% since the second half of 2024, making it the second most abused attack ...
11hon MSN
A new evasion technique has been spotted in malicious file The file included code that 'talks' to AI-based detection tools ...
A new wave of North Korea's 'Contagious Interview' campaign is targeting job seekers with malicious npm packages that infect ...
G Data has observed a surge in malware infections originating from ConnectWise applications with modified certificate tables.
If opened, a single malicious document can spread malware across critical networks. Attackers leverage document-based threats to deploy ransomware, steal credentials, or exfiltrate sensitive data, so ...
A new cybersecurity campaign has exposed 67 trojanized GitHub repositories, targeting gamers and developers with malicious ...
As reported by Silicon Angle, threat actors are now embedding malicious JavaScript payloads in QR codes which causes them to ...
QR code-based phishing, or “quishing,” is not new. INKY itself warned about its growing prominence back in 2023, but forward two years and INKY says that attackers are now going a step further by ...
Google's security has been breached, and hackers are using it to spread malware. This new malware starts with a script hidden ...
Malware-laced PyPI and npm packages steal developer credentials, CI/CD data, and crypto wallets. Attacks target macOS, AI ...
Security researchers at have discovered that hackers are now using the trusted domain Google.com to spread malware.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results