News

Intel, AMD and Arm each published security advisories on Patch Tuesday, including for newly disclosed CPU attacks.
New phishing tactics are abusing trusted domains, real CAPTCHAs, and server-side email validation to selectively target ...
After extracting browser data and crypto wallet extension files, the malware gets the stolen information ready for encryption ...
By downloading what they believe is an AI-generated video, victims have installed malware that can steal their data or offer ...
Marbled Dust has been exploiting a vulnerability in user accounts associated with the Kurdish military operating in Iraq for ...
The Noodlophile malware harvests browser credentials, cryptocurrency wallet information and other sensitive data.
"Instead of relying on traditional phishing or cracked software sites, they build convincing AI-themed platforms – often ...
Supply chain attack compromises the popular rand-user-agent scraping NPM package to deploy and activate a backdoor.
ECHO open source tool hijacks malware’s own update mechanisms to neutralize infections, offering a faster, scalable way to ...
An npm package named 'rand-user-agent' has been compromised in a supply chain attack to inject obfuscated code that activates ...
The scale of the campaign is reflected in the fact that over 38,000 distinct FreeDrain sub-domains hosting lure pages have ...