North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels
The North Korean threat actors behind the Contagious Interview campaign have once again tweaked their tactics by using JSON storage…
The North Korean threat actors behind the Contagious Interview campaign have once again tweaked their tactics by using JSON storage…
Cybersecurity researchers have uncovered critical remote code execution vulnerabilities impacting major artificial intelligence (AI) inference engines, including those from Meta,…
Cybersecurity researchers are sounding the alert about an authentication bypass vulnerability in Fortinet Fortiweb WAF that could allow an attacker…
A Russian-speaking threat behind an ongoing, mass phishing campaign has registered more than 4,300 domain names since the start of…
Cybersecurity researchers have uncovered a malicious Chrome extension that poses as a legitimate Ethereum wallet but harbors functionality to exfiltrate…
The Race for Every New CVE Based on multiple 2025 industry reports: roughly 50 to 61 percent of newly disclosed…
Malware families like Rhadamanthys Stealer, Venom RAT, and the Elysium botnet have been disrupted as part of a coordinated law…
Behind every click, there’s a risk waiting to be tested. A simple ad, email, or link can now hide something…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a critical security flaw impacting WatchGuard Fireware to its…
Cybersecurity researchers are calling attention to a large-scale spam campaign that has flooded the npm registry with thousands of fake…