Transparent Tribe (APT36) is linked to new cyber-espionage attacks using malicious LNK files, adaptive RATs, and long-term ...
A cute-looking AI is quietly reshaping cybercrime. See how KawaiiGPT enables phishing and ransomware for anyone, and why ...
Mac malware campaign uses fake AI chat results to deliver AMOS through terminal commands, security researchers report.
A Lithuanian national has been arrested for his alleged involvement in infecting 2.8 million systems with clipboard-stealing ...
A typosquatted domain impersonating the Microsoft Activation Scripts (MAS) tool was used to distribute malicious PowerShell ...
A new variant of the MacSync Stealer uses a code-signed Swift application to get around Apple's macOS Gatekeeper protections.
The text and code editing tool EmEditor was targeted in a supply chain attack that resulted in the distribution of ...
Fake movie torrents deliver multi-stage malware without the user noticing execution steps AgentTesla steals browser, email, FTP, and VPN credentials silently and efficiently Malicious PowerShell ...
The Python Package Index (PyPI), run by the Python Software Foundation, has officially invalidated all the publishing tokens that were stolen in the GhostAction supply chain attack that happened ...
This weekly recap brings those stories together in one place. No overload, no noise. Read on to see what shaped the threat ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results