GlassWorm uses a fake WakaTime VS Code extension to infect IDEs, deploy RATs, and steal data, prompting urgent credential ...
After details of a yet-to-be-announced model were revealed due to the company leaving unpublished drafts of documents and ...
Threat actors are exploiting the recent Claude Code source code leak by using fake GitHub repositories to deliver Vidar ...
Hackers have been quietly exploiting what appears to be a zero-day in Adobe Acrobat Reader for months, using booby-trapped PDFs to profile targets and decide who's worth fully compromising.
Infosecurity outlines key recommendations for CISOs and security teams to implement safeguards for AI-assisted coding ...
A massive campaign impacting nearly 100 online stores using the Magento e-commerce platform hides credit card-stealing code ...
A convincing Microsoft lookalike tricks users into downloading malware that steals passwords, payments, and account access.
North Korean hackers used an updated version of a known backdoor to target a popular npm package.
DeepLoad exploits ClickFix and WMI persistence to steal credentials, enabling stealth reinfection after three days.
The biggest story of the week is a new massive supply chain breach, which appears to be unrelated to the previous massive supply chain breaches, this time of the Axios HTTP project. Axios was ...
A supply-chain attack backdoored versions of Axios, a popular JavaScript library that's present in many different software ...
In early April 2025, security researchers confirmed that North Korean state-sponsored hackers had successfully compromised the Axios HTTP library. It is one ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results