News

Security researchers found malware packages using the Ethereum blockchain to conceal malicious commands on GitHub repos.
ReversingLabs reveals hackers using Ethereum Smart contracts in NPM packages to conceal malware URLs, bypass scans, and ...
Zscaler ThreatLabs found 77 malicious apps in the Play Store They were downloaded more than 19 million times, carrying different malware The most prevalent variant was Joker Security researchers have ...
A threat actor named WhiteCobra has targeting VSCode, Cursor, and Windsurf users by planting 24 malicious extensions in the ...
The Pakistani APT36 cyberspies are using Linux .desktop files to load malware in new attacks against government and defense entities in India. Although the attacks described in the two reports use ...
Claude AI has been used for fake remote jobs in North Korea to pass interviews and keep high-paying roles. How far will this ...
Google is rolling out a new line of defense to protect Android users and certified devices. As reported by Bleeping Computer, a new program called Developer Verification will help block malware ...
Cybersecurity firm HiddenLayer uncovers a “CopyPasta License Attack” that exploits Coinbase’s favored AI coding tool, Cursor.
Qix is an open source maintainer account that was compromised by a phishing attack. This allowed attackers to infect 18 popular npm packages with malicious code. Together, these packages are ...
Foundational Pillars Of Cloud Automation Before we get into the fancy tools and multi-cloud setups, let’s talk ...