Cookie-gated PHP web shells enable persistent Linux RCE via cron-based re-creation, reducing detection in routine traffic ...
DPRK-linked actors use GitHub C2 and LNK phishing in South Korea, enabling persistent PowerShell control and data ...
Microsoft warns of a new silent cyberattack spreading through WhatsApp messages with disguised VBS files. The malware hides ...
A malware campaign uses WhatsApp messages to deliver VBS scripts that initiate a multi-stage infection chain. The attack ...
The attack chain relies on delayed execution, trusted Windows utilities, and legitimate hosting services to maintain ...
On March 31, 2026, the popular HTTP client Axios experienced a supply chain attack, causing two newly published npm packages ...
There has never been a greater need for secure remote connections to production machinery. Industrial settings are getting ...
A new malware-as-a-service called CrystalRAT is being promoted on Telegram, offering remote access, data theft, keylogging, ...
Hackers are using WhatsApp messages to deliver malware to Windows PCs, exploiting user trust and attachments to trigger ...
Hackers hijacked the npm account of the Axios package, a JavaScript HTTP client with 100M+ weekly downloads, to deliver ...
AI-powered malware is transforming scam compounds into a global cybercrime industry fueled by trafficked workers and willing recruits.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results