DPRK-linked actors use GitHub C2 and LNK phishing in South Korea, enabling persistent PowerShell control and data ...
PowMix targets Czech workforce since Dec 2025 using jittered C2 and ZIP phishing, enabling stealthy remote access and ...
This week, German police unmasked a REvil leader, a critical Docker flaw, Medusa ransomware surged, DPRK hackers abused ...
The CPU-Z And HWMonitor installers being compromised is notable because a user could do everything correctly and still get pwned.
AttackIQ has released a new attack graph that emulates the behaviors of NightSpire Ransomware, a financially motivated ...
Updated: Hijacked maintainer account let attackers slip cross-platform trojan into 100M-downloads-a-week Axios ...
Chinese hacking group Storm-1175 is compressing ransomware attacks from days into hours by exploiting vulnerabilities before ...
Cyber attackers are abusing the low-code automation platform n8n to push malware and track targets through phishing emails, in a campaign that security researchers say gathered pace between October ...
MSBuild, a legitimate Microsoft build tool embedded in many Windows and developer environments, is drawing renewed scrutiny after fresh threat research showed how attackers are using it to run ...
As we turn the page to 2025, it’s impossible not to reflect on the transformative trends of 2024. From the growing influence of AI to the rise of modern languages like Rust and the increasing focus on ...
PowerShell's scripting language and ability to interact directly with Windows system elements give it a superpower that ...
Nearly every major product family needs immediate patching, from Windows to Office to Microsoft Edge, SQL Server, and even ...