The Arkanix Stealer malware can collect and exfiltrate system information, browser data, VPN information, and arbitrary files ...
A sophisticated Python-based malware deployment uncovered during a fraud investigation has revealed a layered attack involving obfuscation, disposable infrastructure and commercial offensive tools.
Chainguard, the trusted source for open source, today announced it has expanded Chainguard Libraries coverage across Python, Java, and JavaScript, with customers seeing 94% coverage across the Python ...
While the Windows maker did not attribute the activity to a specific threat actor, the use of VS Code tasks and Vercel ...
A new variation of the fake recruiter campaign from North Korean threat actors is targeting JavaScript and Python developers with cryptocurrency-related tasks. The activity has been ongoing since at ...
Source Code Exfiltration in Google AntigravityTL;DR: We explored a known issue in Google Antigravity where attackers can silently exfiltrate proprietary source codeBy hiding malicious instructions ...
PromptSpy, discovered by ESET, is the first known Android malware to integrate generative AI into its execution flow.
Sample files for Azul are kept in a Simple Storage Service (S3) compatible binary large object (blob) store, and processed ...
Lazarus Group evolving Operation Dream Job campaign to target Web3 developers New “Graphalgo” variant uses malicious dependencies in legitimate bare-bone projects on PyPI/npm ReversingLabs found ~200 ...
A low-skilled threat actor was able to do a lot with the help of AI, Amazon researchers warn.
The Arkanix infostealer combines LLM-assisted development with a malware-as-a-service model, using dual language implementations to maximize reach and establish persistence.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results