We found fake “verify you are human” pages on hacked WordPress sites that trick Windows users into installing the Vidar ...
The Contagious Interview campaign weaponizes job recruitment to target developers. Threat actors pose as recruiters from crypto and AI companies and deliver backdoors such as OtterCookie and ...
ESET researchers have traced the reactivation of Sednit’s advanced implant team to a 2024 case in Ukraine, where a keylogger ...
APT28 deploys BEARDSHELL and COVENANT since April 2024 targeting Ukrainian military, enabling cloud-based espionage and persistent surveillance.
ESET researchers document how the Sednit APT group has reemerged with a modern toolkit centered on two paired implants – BeardShell and Covenant.
Threat actors are employing a new variation of the ClickFix social engineering technique called InstallFix to convince users ...
OAuth redirection is being repurposed as a phishing delivery path. Trusted authentication flows are weaponized to move users ...
IntroductionIn January 2026, Zscaler ThreatLabz observed activity by a suspected Iran-nexus threat actor targeting government officials in Iraq. ThreatLabz discovered previously undocumented malware ...
DeepSeek V4 Lite and GPT 5.3 (Garlic) represent two of the most-discussed developments in artificial intelligence this week, as overviewed by Universe of AI. DeepSeek V4 Lite, reportedly leaked ...
Has AI coding reached a tipping point? That seems to be the case for Spotify at least, which shared this week during its fourth-quarter earnings call that the best developers at the company “have not ...
To implement this solution, you will need access to an SMTP server for sending the email notifications. To receive an email notification when your Windows computer is unlocked, follow the steps ...
Chinese e-commerce giant Alibaba's Qwen team of AI researchers has emerged in the last year as one of the global leaders of open source AI development, releasing a host of powerful large language ...