The long-running Contagious Interview campaign is now hiding BeaverTail and InvisibleFerret payloads inside JSON storage ...
China-linked APT24 hackers have been using a previously undocumented malware called BadAudio in a three-year espionage campaign that recently switched to more sophisticated attack methods.
Huntress finds three GootLoader infections since Oct 27, 2025; two led to domain controller compromise within 17 hours.
The economics of cybercrime have shifted dramatically. What once took skilled attackers weeks to reverse engineer can now be accomplished in hours using AI-powered analysis tools and automated systems ...
Big firms like Microsoft, Salesforce, and Google had to react fast — stopping DDoS attacks, blocking bad links, and fixing ...
Gootloader malware resurfaces using malvertising and SEO poisoning to spread infectionsAttackers now obfuscate malware names using deceptive web fonts and glyph swappingLoader delivers ransomware, ...
The typosquatted “@acitons/artifact” package targeted GitHub’s CI/CD workflows, stealing tokens and publishing malicious ...
The GlassWorm malware campaign, which impacted the OpenVSX and Visual Studio Code marketplaces last month, has returned with ...
Over the last month, Barracuda threat analysts have seen the following notable developments in email-based threats targeting ...
Security researchers at Push Security are warning that Sneaky2FA, an advanced phishing-as-a-service (PhaaS) kit, has released ...
A North Korea-linked hacking campaign hides advanced malware inside public JSON storage services during fake job tests.
With its new browser-in-the-browser capability, the tool helps threat actors fool employees into giving up credentials.