In essence, MalTerminal is a malware generator. When adversaries bring it up, it asks if they want to create a ransomware ...
Two malicious packages with nearly 8,500 downloads in Rust's official crate repository scanned developers' systems to steal ...
New DDoS botnet ShadowV2 targets misconfigured Docker containers and offers a service model where customers launch their own ...
Iranian cyber group UNC1549 hacked 11 telecom firms, deploying Azure-hosted MINIBIKE malware through LinkedIn lures to steal ...
ESET researchers reveal how malware operators collaborate with covert North Korean IT workers, posing a threat to both headhunters and job seekers.
Explore emerging attack methods, evolving AI-driven threats, supply chain risks, and strategies to strengthen defenses and ...
The campaign detailed in the report, dubbed “ShadowV2,” is a Python-based command-and-control framework hosted on GitHub ...
ZachXBT documents North Korean IT workers infiltrating crypto companies in over 25 instances for hacks and extortion schemes.
The stealer campaign has evolved into a multi-stage delivery chain that ultimately deploys the modular, feature-rich PureRAT.
The DDoS-for-hire campaign exploits misconfigured Docker containers on AWS, using cloud-native environments for industrial ...
Stanford and Arc Institute used AI to design viruses that kill bacteria, sparking hope for new therapies and warnings over biosecurity risks.
The case of the Latvian streamer Raivo Plavniek is particularly tragic, known as RastlandTV. The content creator, suffering ...