Malicious JavaScript code delivered by the AppsFlyer Web SDK hijacked cryptocurrency, potentially in a supply-chain attack.
ThreatDown Uncovers First Cyber Attack Abusing Deno JavaScript Runtime for Fileless Malware Delivery
ThreatDown, the corporate business unit of Malwarebytes, today published research documenting what researchers believe to be ...
ESET researchers document how the Sednit APT group has reemerged with a modern toolkit centered on two paired implants – BeardShell and Covenant.
Poorly written emails with spelling mistakes and obvious deception were once a clear marker of phishing attacks. These unrefined and isolated scams ...
GitLab exposes abuse of its platform to trick software developers into downloading malicious payloads and finance companies ...
Your weekly cybersecurity roundup covering the latest threats, exploits, vulnerabilities, and security news you need to know.
GlassWorm campaign used 72 malicious Open VSX extensions and infected 151 GitHub repositories, enabling stealth supply-chain attacks on developers.
ESET researchers have traced the reactivation of Sednit’s advanced implant team to a 2024 case in Ukraine, where a keylogger ...
AI guardrails increasingly block legitimate security work while attackers bypass restrictions with ease. For CISOs, this asymmetry creates blind spots in defensive capabilities.
Image courtesy by QUE.com Artificial intelligence systems are increasingly being deployed as agents that can take actions on ...
IntroductionOn March 1, 2026, ThreatLabz observed new activity from a China-nexus threat actor targeting countries in the Persian Gulf region. The activity took place within the first 24 hours of the ...
But QR codes can also leave you vulnerable. That’s because scammers, organized criminal gangs, and shady nation-states are ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results