Tycoon2FA has become a leading phishing-as-a-service (PhaaS) platforms, enabling campaigns that reach over 500,000 ...
A developer-targeting campaign leveraged malicious Next.js repositories to trigger a covert RCE-to-C2 chain through standard ...
A previously undocumented set of 23 iOS exploits named "Coruna" has been deployed by multiple threat actors in targeted ...
While the Windows maker did not attribute the activity to a specific threat actor, the use of VS Code tasks and Vercel ...
The UK has agreed to a US request to use British military bases for "defensive" strikes on Iranian missile sites, Sir Keir ...
Security researchers have disclosed a high-severity vulnerability dubbed "ClawJacked" in the popular AI agent OpenClaw that ...
Linked to North Korean fake job-recruitment campaigns, the poisoned repositories are aimed at establishing persistent C2 ...
An OpenClaw vulnerability allowed malicious websites to take over AI agents, exposing sensitive information and enabling data ...
A compromised Chrome extension with 7,000 users was updated to deploy malware, strip security headers, and steal ...
A fake CAPTCHA scam is tricking Windows users into running PowerShell commands that install StealC malware and steal ...