PDFs are the second most common file type used to deliver malware. Because they’re trusted for invoices, policies, and ...
Cybersecurity researchers have flagged a new set of 175 malicious packages on the npm registry that have been used to ...
Cybersecurity researchers are calling attention to a new campaign that delivers the Astaroth banking trojan that employs ...
At the upcoming Lived! 360 Orlando 2025 conference, Tim Purdum, Engineering Manager and Senior Software Engineer at dymaptic, ...
A new variant of the FileFix social engineering attack uses cache smuggling to secretly download a malicious ZIP archive onto ...
SquareX has demonstrated how malicious browser extensions can impersonate AI sidebar interfaces for phishing and other ...
Cybersecurity researchers at Google’s Threat Intelligence Group (GTIG) have uncovered a sophisticated hacking campaign by a North Korean state-linked group ...
North Korean threat group Famous Chollima is using blockchain technology to hide malware payloads in smart contracts, which ...
Hackers are using a combination of social engineering, cache smuggling, identity theft, and straight-up bluffing, to bypass common security protections and deploy malware onto victim’s computers, ...
North Korean hackers expand cyber campaigns using blockchain-based malware to steal cryptocurrency and evade detection, ...
North Korean state-sponsored threat actors are now using public blockchains to host malicious code and deploy malware on ...
Alarms raised again as a recent cybersecurity report released by Cisco Talos claims that a new campaign by North Korean ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results