Trojanized gaming tools and new Windows RATs like Steaelite enable data theft, ransomware, and persistent remote control.
Fake IT support calls delivered Havoc C2, enabling credential theft, lateral movement, and ransomware prep across five ...
A compromised Chrome extension with 7,000 users was updated to deploy malware, strip security headers, and steal cryptocurrency wallet seed phrases.
Those old Wii Remotes you have collecting dust still have life left in them. With a little creativity, you can use them in ...
A developer-targeting campaign leveraged malicious Next.js repositories to trigger a covert RCE-to-C2 chain through standard ...
The Arkanix Stealer malware can collect and exfiltrate system information, browser data, VPN information, and arbitrary files ...
Linked to North Korean fake job-recruitment campaigns, the poisoned repositories are aimed at establishing persistent C2 ...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released new details about RESURGE, a malicious implant used in zero-day attacks exploiting CVE-2025-0282 to breach Ivanti Connect ...
Why encrypted backups may fail in an AI-driven ransomware era ...
Zscaler ThreatLabz assessed with medium to high confidence that an Iranian adversary targeted Iraq’s Ministry of Foreign ...
The malware can remain undetected on a system until a threat actor initiates a connection with the compromised device, a CISA ...
The Microsoft Defender team has discovered a coordinated campaign targeting software developers through malicious repositories posing as legitimate Next.js projects and technical assessment materials, ...