The long-running Contagious Interview campaign is now hiding BeaverTail and InvisibleFerret payloads inside JSON storage ...
Gootloader JavaScript malware, commonly used to deliver ransomware, is back in action after a period of reduced activity.
Huntress finds three GootLoader infections since Oct 27, 2025; two led to domain controller compromise within 17 hours.
The typosquatted “@acitons/artifact” package targeted GitHub’s CI/CD workflows, stealing tokens and publishing malicious ...
"The threat actors have recently resorted to utilizing JSON storage services like JSON Keeper, JSONsilo, and npoint.io to ...
The economics of cybercrime have shifted dramatically. What once took skilled attackers weeks to reverse engineer can now be accomplished in hours using AI-powered analysis tools and automated systems ...
A North Korea-linked hacking campaign hides advanced malware inside public JSON storage services during fake job tests.
Developers will have to contend with a dormant turned active malicious code on Visual Studio Code (VS Code) extensions, which ...
The GlassWorm malware campaign, which impacted the OpenVSX and Visual Studio Code marketplaces last month, has returned with ...
Google's Threat Intelligence Group (GTIG) has identified a major shift this year, with adversaries leveraging artificial intelligence to deploy new malware families that integrate large language ...
The Gootloader malware scam, which was thought to have been disrupted and shut down in March 2025, has returned with both old ...
Over the last month, Barracuda threat analysts have seen the following notable developments in email-based threats targeting ...