News
The Lumma infostealer malware operation is gradually resuming activities following a massive law enforcement operation in May ...
An attack on a US accounting firm delivered PureRAT via Ghost Crypt, involving social engineering and advanced obfuscation ...
The malware, imaginatively named LameHug, is coded in Python and uses Hugging Face API to interact with certain LLM protocols ...
A new attack uses CVE-2021-41773 in Apache HTTP Server to install a cryptocurrency miner via compromised websites.
Recent attacks by the state-run cyberespionage group against Ukrainian government targets included malware capable of ...
GitHub is an extremely popular platform in the open source world, and as such is under a constant barrage of attacks. This ...
From Bluetooth exploits in vehicles to macOS backdoors and GitHub phishing tricks—this week’s threats go deeper than they ...
Criminals are using a dangerous fake free VPN to spread malware via GitHub - here's how to stay safe
Security experts have warned of an emerging new cyber threat involving fake VPN software hosted on GitHub. A report from Cyfirma outlines how malware disguises itself as a “Free VPN for PC” and lures ...
Increasing reliance on open-source repositories calls for much higher-level vigilance to counter deceptive tactics.
Microsoft continues to work tirelessly to fix bugs and patch security holes in Windows to help protect users from hackers and ...
Aeza Group, a Russian bulletproof hosting provider, and four affiliates have been sanctioned by the US government for supporting ransomware and cybercrime, marking the second time this year the US has ...
Microsoft's takedown of Lumma Stealer marks a significant victory against infostealer malware, safeguarding millions of devices from data theft and breaches.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results