News

The latest JavaScript specification standardizes a well-balanced and thoughtful set of features, including the built-in ...
Once opened in a browser, the code decrypts a secondary payload using a static XOR key and then redirects the user to an attacker-controlled site via the window.location.href function. These URLs ...
Seemingly harmless SVGs are packed with malicious JavaScript for a phishing redirect to actor-controlled URLs.
A fake extension for the Cursor AI IDE code editor infected devices with remote access tools and infostealers, which, in one ...
Malicious GitHub repositories used by threat actors to host Amadey payloads and steal data, impacting targeted entities.
The malicious code is hidden within a CDATA section of the SVG file and relies on a static XOR key to decrypt a payload at ...
The JavaScript code acts as a traffic distribution system (TDS), using IP filtering techniques to redirect users to fake ...
Advancements in AI mean that people can create software just by describing it. Consider this your vibe coding primer.
Part of the Perforce Continuous Testing Platform, Perfecto AI generates execution-ready test actions from natural language ...
Hackers have adopted the new technique called 'FileFix' in Interlock ransomware attacks to drop a remote access trojan (RAT) ...
The PHP Interlock RAT version was observed as part of a wider Interlock campaign which has been active since at least May ...
Threat actors are using anti-box tools, AI, and cloaking-as-a-service tactics to bypass security tools by showing a phishing or other malicious site to targets and harmless ones to detection and ...