PDFs are the second most common file type used to deliver malware. Because they’re trusted for invoices, policies, and ...
Cybersecurity researchers have flagged a new set of 175 malicious packages on the npm registry that have been used to ...
A new variant of the FileFix social engineering attack uses cache smuggling to secretly download a malicious ZIP archive onto ...
Cybersecurity researchers at Google’s Threat Intelligence Group (GTIG) have uncovered a sophisticated hacking campaign by a North Korean state-linked group ...
North Korean threat group Famous Chollima is using blockchain technology to hide malware payloads in smart contracts, which ...
Cybersecurity researchers are calling attention to a new campaign that delivers the Astaroth banking trojan that employs ...
North Korean state-sponsored threat actors are now using public blockchains to host malicious code and deploy malware on ...
At the upcoming Lived! 360 Orlando 2025 conference, Tim Purdum, Engineering Manager and Senior Software Engineer at dymaptic, ...
Hackers are using a combination of social engineering, cache smuggling, identity theft, and straight-up bluffing, to bypass common security protections and deploy malware onto victim’s computers, ...
North Korean hackers expand cyber campaigns using blockchain-based malware to steal cryptocurrency and evade detection, ...
Codex gives software developers a first-rate coding agent in their terminal and their IDE, along with the ability to delegate ...
SquareX has demonstrated how malicious browser extensions can impersonate AI sidebar interfaces for phishing and other nefarious purposes.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results