News

A new report traces the history of the early wave of Chinese hackers who became the backbone of the state's espionage apparatus.
A novel malware family named LameHug is using a large language model (LLM) to generate commands to be executed on compromised ...
Malicious GitHub repositories used by threat actors to host Amadey payloads and steal data, impacting targeted entities.
Newly published research shows that the domain name system—a fundamental part of the web—can be exploited to hide malicious ...
North Korean hackers continue attacking open-source software via npm packages. 67 new malicious packages with XORIndex Loader ...