DPRK-linked actors use GitHub C2 and LNK phishing in South Korea, enabling persistent PowerShell control and data ...
Discover 10 practical ChatGPT prompts SOC analysts can use to speed up triage, analyze threats, improve documentation, and ...
On March 31, 2026, the popular HTTP client Axios experienced a supply chain attack, causing two newly published npm packages ...
Augmented Marauder targets Latin America and Europe since 2020, using dynamic PDF phishing to spread Casbaneiro via Horabot.
The financially motivated cybercriminal threat actor Storm-1175 operates high-velocity ransomware campaigns that weaponize ...
This week, German police unmasked a REvil leader, a critical Docker flaw, Medusa ransomware surged, DPRK hackers abused ...
As artificial intelligence, social engineering, and threat actor operations become increasingly sophisticated, ...
Microsoft is updating users to Windows 11 version 25H2, a new Xbox Games Showcase on the horizon, long-requested features for ...
As enterprises rely more heavily on AI technologies and services, attackers’ living-off-the-land techniques have evolved to ...
Updated: Hijacked maintainer account let attackers slip cross-platform trojan into 100M-downloads-a-week Axios ...
A North Korea-nexus threat actor compromised the widely used axios npm package, delivering a cross-platform remote access ...
Image courtesy by QUE.com Autonomous AI agents are quickly moving from experimental demos to real operational tools. They can browse ...