The malicious packages, including "nhattuanbl/lara-helper" and "nhattuanbl/simple-queue," contain obfuscated PHP code that connects to a command and...
malware
Cybernews reports that AI has been tapped by malicious actors to generate vibe hacking scripts and modular...
Infosecurity Magazine reports that Iranian threat operation Dust Specter has spoofed Iraq's Ministry of Foreign Affairs to...
Information included Social Security, driver's license and voter records dating to the 1990s.
The SloppyLemming group employed two distinct attack chains to deploy malware.
Windows systems have been covertly compromised with the Teramind endpoint monitoring software for unauthorized surveillance as part...
Multiple malicious payloads have been distributed in attacks exploiting the Windows File Explorer and WebDAV protocol as...
Trojanized tools for the Roblox and Xeno games have been harnessed to deliver a remote access trojan...
The Ruby Jumper campaign, first identified by Zscaler ThreatLabz in December 2025, deploys multiple malware families such...
The compromised Go module injects malicious code into the "ssh/terminal/terminal.go" file, specifically within the "ReadPassword()" function.