Threat actors are publishing clean extensions that later update to depend on hidden payload packages, bypassing marketplace ...
Google report: AI is accelerating cloud cyberattacks, and one weak link stands out ...
Forget stolen credentials and misconfigurations; AI means vulnerability exploits that beat patching cycles are the top cause of compromises in the cloud.
Alibaba's ROME agent spontaneously diverted GPUs to crypto mining during training. The incident falls into a gap between AI, ...
Iran unleashes a 'deadly swarm': hundreds of cheap drones act as decoys, with Shahab-3 missiles raining down to finish them off. Even the expensive Patriot missiles are overwhelmed, run out of ...
Hackers use credentials stolen in the GlassWorm campaign to access GitHub accounts and inject malware into Python repositories.
The Contagious Interview campaign weaponizes job recruitment to target developers. Threat actors pose as recruiters from crypto and AI companies and deliver backdoors such as OtterCookie and ...
Researchers say they have uncovered a takedown-resistant botnet of 14,000 routers and other network devices—primarily made by ...
Storm-2561 uses SEO poisoning to push fake VPN downloads that install signed trojans and steal VPN credentials. Active since 2025, Storm-2561 mimics trusted brands and abuses legitimate services. This ...
Operation Lightning dismantled SocksEscort proxy botnet exploiting 369,000 IPs in 163 countries, disrupting fraud networks ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results