A fake video meeting can now be enough to breach a Web3 company, with North Korea-linked BlueNoroff hackers using bogus Zoom calls, clipboard tricks and fileless PowerShell malware to steal ...
A threat group planted a malicious npm package in a crypto trading project through an AI-generated commit by Anthropic's ...
GitHub facades and Ethereum smart contracts power a March 2026 admin-targeted campaign, enabling resilient C2 rotation and ...
Targeting high-precision floating-point arithmetic operations in engineering modeling software, Fast16 may now be the ...
Threat hunters are warning that the cybercriminal operation known as VECT 2.0 acts more like a wiper than a ransomware due to ...
A new report from ReversingLabs identified a new tactic by North Korean hackers: feeding malicious code to the AI systems ...
A targeted malware campaign aimed at Pakistan’s government-linked security infrastructure has exposed how threat actors are combining social engineering, obfuscated code and trusted online services to ...
A newly discovered threat actor is using Microsoft Teams, AWS S3 buckets, and custom "Snow" malware in a multipronged ...
Security researchers have identified malware dating back to 2005 that appears to have been designed to disrupt Iran’s nuclear ...
A previously unknown threat group using tried-and-tested social engineering tactics - Microsoft Teams chat invitations and ...
The Fast16 sabotage malware targeted high-precision computing workloads and could propagate through entire facilities.