JADESNOW uses EtherHiding to fetch, decrypt, and execute malicious payloads from smart contracts on the BNB Smart Chain and ...
Cybersecurity researchers are calling attention to a new campaign that delivers the Astaroth banking trojan that employs ...
Cybersecurity researchers have flagged a new set of 175 malicious packages on the npm registry that have been used to ...
A new phishing and malware distribution toolkit called MatrixPDF allows attackers to convert ordinary PDF files into interactive lures that bypass email security and redirect victims to credential ...
Version 1.3 of the Bun JavaScript runtime and toolkit has landed, pushing forward the project's goal to consolidate ...
The coordinated campaign abuses Visual Studio Code and OpenVSX extensions to steal code, mine cryptocurrency, and maintain ...
Researchers at security company Varonis have uncovered a crafty new Gmail phishing attack that not only masquerades as a PDF ...
Chrome faces its sixth zero-day attack in 2025 as Google patches critical V8 engine flaw CVE-2025-10585 discovered by Threat ...
Discover the types of malware in 2025, from backdoors to ransomware, and learn which families hackers use most in real-world ...
Threat actors are abusing legitimate NPM infrastructure in a new phishing campaign that breaks from the typical supply chain attack pattern.
A Sonatype report reveals a sharp rise in sophisticated attacks hiding in trusted code libraries, with data theft becoming ...
Real-user metrics (RUM) are now standard. Platforms instrument LCP, First Input Delay (FID), Cumulative Layout Shift (CLS), ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results