Threat actors are targeting technology, manufacturing, and financial organizations in campaigns that combine device code phishing and voice phishing (vishing) to abuse the OAuth 2.0 Device ...
Vulnerabilities in Anthropic’s Claude Code tool could have allowed attackers to silently gain control of a developer’s computer.
A maximum severity vulnerability in the FreeScout helpdesk platform allows hackers to achieve remote code execution without any user interaction or authentication.
Crypto hackers are expanding their ClickFix attacks using fake VC firms and a hijacked Chrome extension to steal wallet data ...
"In 2026, most cyber attacks will be carried out using AI," he said. — According to foreign industry agencies, the number of such attacks in the world has increased by 70% in a year.
Teenage hackers are quietly reshaping cybercrime. They’re not movie-style geniuses, but persistent, socially connected, and often addicted—causing real harm through data breaches and feeding a cycle ...
North Korean-linked campaign publishes 26 malicious npm packages hiding C2 in Pastebin, deploying credential stealers & RAT via 31 Vercel deployments.
Crypto criminals are refining social engineering tactics to bypass traditional security tools, using fake venture capital outreach to deploy a technique known as ClickFix.
New York Magazine on MSN

The AI-Powered Hacking Spree Is Here

It turns out AI-coding tools are useful to criminals, too.
The former boss of a U.S. hacking tools maker was jailed for selling highly sensitive software exploits to a Russian broker.
PCWorld reports that AI-powered phishing scams now use personalized data from breaches and social media to create convincing ...
I'm done juggling 5 different chat apps ...