PDFs are the second most common file type used to deliver malware. Because they’re trusted for invoices, policies, and ...
Researchers expose new WordPress malware and ClickFix phishing kits exploiting cache smuggling for stealth attacks.
A new variant of the FileFix social engineering attack uses cache smuggling to secretly download a malicious ZIP archive onto ...
Cybersecurity researchers have flagged a new set of 175 malicious packages on the npm registry that have been used to ...
At the upcoming Lived! 360 Orlando 2025 conference, Tim Purdum, Engineering Manager and Senior Software Engineer at dymaptic, ...
Hackers are using a combination of social engineering, cache smuggling, identity theft, and straight-up bluffing, to bypass ...
North Korean threat group Famous Chollima is using blockchain technology to hide malware payloads in smart contracts, which ...
North Korean hackers expand cyber campaigns using blockchain-based malware to steal cryptocurrency and evade detection, ...
North Korean state-sponsored threat actors are now using public blockchains to host malicious code and deploy malware on ...
Researchers at tech giant Google's Threat Intelligence team highlight a years-old exploit that is now being used by North ...
Threat actors are abusing legitimate NPM infrastructure in a new phishing campaign that breaks from the typical supply chain attack pattern.
Alarms raised again as a recent cybersecurity report released by Cisco Talos claims that a new campaign by North Korean hackers is focused on stealing vulnerabl ...