News

Seemingly harmless SVGs are packed with malicious JavaScript for a phishing redirect to actor-controlled URLs.
The malicious code is hidden within a CDATA section of the SVG file and relies on a static XOR key to decrypt a payload at ...
Because these attackers leverage spoofed domains and senders to trick you, it isn’t as easy as just avoiding emails from unknown senders. Instead, you should delete any email with an .SVG attachment ...
Because the latest attacks leverage spoofed domains and senders to trick you, it isn’t as easy as just avoiding emails from ...
Malicious GitHub repositories used by threat actors to host Amadey payloads and steal data, impacting targeted entities.