Ten typosquatted npm packages (Jul 4, 2025) delivered a 24MB PyInstaller info stealer using 4 obfuscation layers; ~9,900 ...
North Korean hackers are now using a blockchain-based method known as EtherHiding to deliver malware to facilitate their ...
Chrome faces its sixth zero-day attack in 2025 as Google patches critical V8 engine flaw CVE-2025-10585 discovered by Threat ...
Attackers are using the open-source red-team tool RedTiger to build an infostealer that collects Discord account data and ...
Alarms raised again as a recent cybersecurity report released by Cisco Talos claims that a new campaign by North Korean ...
EtherHiding’: Nation-state and cybercriminal groups are leveraging smart contracts as command-and-control servers for ...
Google’s Threat Intelligence Group has linked North Korean hackers to EtherHiding, blockchain malware previously used by ...
Treat this as an immediate security incident, CISOs advised; researchers say it’s one of the most sophisticated supply chain ...
Cybersecurity researchers at Google’s Threat Intelligence Group (GTIG) have uncovered a sophisticated hacking campaign by a North Korean state-linked group ...
There isn’t a consistent threat model for extension marketplaces yet, McCarthy said, making it difficult for any platform to anticipate these risks. However, he added, Microsoft’s marketplace has seen ...
Google’s Threat Intelligence Group has uncovered a new cyberattack method called EtherHiding, developed by North Korean ...
Google reveals North Korean hackers are using EtherHiding, a blockchain-based technique, to deliver malware and steal cryptocurrency ...