Everything there is to find on tag: malware.
ZipLine phishing campaign exploits trust in contact forms
Suspicious emails remain effective, but the danger they pose is being combated from all sides. The same canno...
Everything there is to find on tag: malware.
Suspicious emails remain effective, but the danger they pose is being combated from all sides. The same canno...
Anthropic has stopped hackers who attempted to abuse the Claude AI system. The attackers aimed to craft phish...
Security researchers have discovered a new ransomware variant that exploits previously known SharePoint vulne...
Social engineering is now responsible for 39% of all successful attempts to gain access to organizations, wit...
Cybercriminals are using increasingly ingenious methods to evade detection. A recent example shows how the do...
A Russian blockchain developer lost half a million dollars in cryptocurrency after installing a malicious ext...
Sonatype discovered 16,279 malicious open-source packages in Q2 2025, marking a 188 percent increase from the...
Kernels, drivers, and other critical components of IT systems are being rewritten en masse in Rust. It's taki...
A new version of the Android malware Godfather creates isolated virtual environments on mobile devices to ste...
A wiper module makes the Akira ransomware more effective than before. Even if victims pay the ransom, they lo...