OAuth redirection is being repurposed as a phishing delivery path. Trusted authentication flows are weaponized to move users from legitimate sign‑in pages to attacker‑controlled infrastructure.
There are moments in the evolution of a nation when a single incident, seemingly isolated, exposes a deeper and more troubling ...
North Korean hackers are deploying newly uncovered tools to move data between internet-connected and air-gapped systems, spread via removable drives, and conduct covert surveillance.
A critical OpenClaw flaw allowed malicious websites to connect to locally running agents, brute-force passwords without ...
Trojanized gaming tools and new Windows RATs like Steaelite enable data theft, ransomware, and persistent remote control.
While the Windows maker did not attribute the activity to a specific threat actor, the use of VS Code tasks and Vercel ...
The Microsoft Defender team has discovered a coordinated campaign targeting software developers through malicious repositories posing as legitimate Next.js projects and technical assessment materials, ...
Linked to North Korean fake job-recruitment campaigns, the poisoned repositories are aimed at establishing persistent C2 ...
PromptSpy, discovered by ESET, is the first known Android malware to integrate generative AI into its execution flow.
The Arkanix Stealer malware can collect and exfiltrate system information, browser data, VPN information, and arbitrary files ...