Cybersecurity researchers are calling attention to a new campaign that delivers the Astaroth banking trojan that employs ...
Many organizations lack complete visibility into all JavaScript code executing on their pages. Scripts can dynamically load ...
Researchers at security company Varonis have uncovered a crafty new Gmail phishing attack that not only masquerades as a PDF ...
A new variant of the FileFix social engineering attack uses cache smuggling to secretly download a malicious ZIP archive onto ...
A new phishing and malware distribution toolkit called MatrixPDF allows attackers to convert ordinary PDF files into ...
Hackers are using a combination of social engineering, cache smuggling, identity theft, and straight-up bluffing, to bypass ...
Codex gives software developers a first-rate coding agent in their terminal and their IDE, along with the ability to delegate ...
GitHub is used by hackers to steal crypto credentials through phishing and covert keylogging attacks with the Astaroth ...
A new AsyncRAT malware campaign from threat actor TA558 is targeting the South American hospitality industry, demanding the ...
Threat actors are abusing legitimate NPM infrastructure in a new phishing campaign that breaks from the typical supply chain attack pattern.
Discover the types of malware in 2025, from backdoors to ransomware, and learn which families hackers use most in real-world attacks.
The JavaScript development community faced one of its most sophisticated supply chain attacks in September, when a ...