
PyPI Phishing Campaign | JuiceLedger Threat Actor Pivots From Fake Apps to Supply Chain Attacks
A new threat actor is spreading infostealer malware through targeted attacks on developers and fraudulent cryptotrading applications.
Read More
A new threat actor is spreading infostealer malware through targeted attacks on developers and fraudulent cryptotrading applications.
Crimeware vendors say 'macros are dead', but they have a new weapon to help threat actors successfully deploy malware.
The self-proclaimed 'oldest ransomware affiliate on the planet' has new tricks and new features and continues to beat enterprise defenses.
Learn how threat actors manipulate Windows to install malicious apps that are trusted by the system, and how to defend against them.
Chinese-linked phishing campaign seeks to compromise Russian targets with custom malware designed for espionage.
Targeting organizations in SE Asia and Australia, Aoqin Dragon uses pornographic-themed lures and custom backdoors to conduct espionage operations.
A new typosquatting attack against the PyPI repository targets enterprise Macs with a distinctive obfuscation method.
Software developers using GitLab CI are being targeted with malware through a typosquatting attack, putting downstream users at risk.
Visualizing data is integral to threat research. See how we used this timeline analysis tool to track activity in the Ukrainian cyber conflict.
Two high-severity flaws in popular end user security tools allow attackers to elevate privileges and compromise devices.