Over 1,000 exposed ComfyUI instances exploited via unauthenticated code execution, enabling Monero mining and botnet expansion.
DPRK-linked actors use GitHub C2 and LNK phishing in South Korea, enabling persistent PowerShell control and data ...
The maintainer account for the axios package on npm was compromised to inject a remote access trojan for Windows, macOS, and ...
An incident of LinkedIn malware means jobseekers and employers need to take more care with their applications and ...
A supply-chain attack backdoored versions of Axios, a popular JavaScript library that's present in many different software ...
A North Korea-nexus threat actor compromised the widely used axios npm package, delivering a cross-platform remote access ...
OpenClaw, an open-source AI agent with a red lobster logo, has sparked a nationwide craze in China in early 2026.Unlike ...
IntroductionOn March 31, 2026, Anthropic accidentally exposed the full source code of Claude Code (its flagship ...
A new malware-as-a-service called CrystalRAT is being promoted on Telegram, offering remote access, data theft, keylogging, ...
A malware campaign uses WhatsApp messages to deliver VBS scripts that initiate a multi-stage infection chain. The attack ...
Hackers are using WhatsApp messages to deliver malware to Windows PCs, exploiting user trust and attachments to trigger ...
A series of malicious LNK files targeting users in South Korea has been detected using a multi-stage attack chain that uses ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results