Ghostwriter used Prometheus lures since spring 2026 to target Ukraine agencies, enabling malware delivery and data theft.
The Tycoon2FA phishing kit now supports device-code phishing attacks and abuses Trustifi click-tracking URLs to hijack ...
Google on Wednesday published exploit code for an unfixed vulnerability in its Chromium browser codebase that threatens ...
Socket raises $60M to expand AI-driven software supply chain security and protect developers from cyber threats worldwide.
Google has accidentally leaked details about an unfixed issue in Chromium that keeps JavaScript running in the background ...
A desktop app that lets users stream any movie, TV series, or anime for free and without ads hit the top of GitHub’s global ...
Proton VPN is the VPN I recommend when someone tells me they have an actual reason to care about their privacy. A journalist in a difficult country, a researcher who doesn’t want their query history ...
Copycat hackers are competing to win $1,000 for the largest supply chain attack using Shai-Hulud, an open-sourced worm that has brought down a few major open-source projects. Malicious NPM packages ...
Hulud payload to steal CI/CD secrets from Linux-based automation environments. The malware executes during npm install and ...
Wedding dress codes should be clearly stated to inform guests of how to choose their wardrobe for your celebration. More formal dress codes come with certain requirements—like dark jackets and long ...
The stealthy vulnerability impacts roughly 88 million domains and can be exploited to bypass DNS filtering and hide ...
A legacy Windows scripting utility tied to Internet Explorer is still being used in modern malware campaigns, researchers say ...