A multi-stage phishing campaign targeting Russia abuses GitHub and Dropbox to disable Microsoft Defender and deploy Amnesia ...
The Gootloader malware, typically used for initial access, is now using a malformed ZIP archive designed to evade detection ...
Threat actors are exploiting misconfigured web applications used for security training and internal penetration testing, such ...
The phishing campaign shows how attackers continue to weaponize legitimate cloud services and open source tools to evade ...
North Korean hackers abuse Visual Studio Code task files in fake job projects to deploy backdoors, spyware, and crypto miners ...
Prompt injection for the win Anthropic has fixed three bugs in its official Git MCP server that researchers say can be ...
A ransomware operation known as DeadLock has been observed abusing Polygon blockchain smart contracts to manage and rotate ...
Cybersecurity researchers are becoming interested in a newly discovered ransomware strain called DeadLock that abuses Polygon smart contracts to silently service its infrastructure and bypass ...
What it discovered were stolen datasets belonging to 12 unnamed and unconnected firms hit in separate INC ransomware attacks.
Five tools that do the same thing but with completely different workflows.