Researchers report phishing emails in Russia using ISO attachments to deploy Phantom Stealer against finance and related ...
VolkLocker uses AES-256 in Galois/Counter Mode ( GCM) for encryption through Golang's "crypto/rand" package. Every encrypted ...
Apple fixes two exploited WebKit bugs targeting specific users, issuing security updates across iOS, macOS, and Safari.
CISA warns of active exploitation of Sierra Wireless router flaw allowing remote code execution via unrestricted file upload.
Researchers detail new AI and phishing kits that steal credentials, bypass MFA, and scale attacks across major services.
Enterprises rely on browser-based GenAI, increasing data-exposure risks and demanding strict policies, isolation, and ...
PyStoreRAT spreads via fake GitHub tools using small Python or JavaScript loaders to fetch HTA files and install a modular ...
CISA reports active exploitation of GeoServer XXE flaw CVE-2025-58360 and directs immediate updates to secure affected ...
Huntress reports active attacks abusing Gladinet’s fixed cryptographic keys to forge tickets and gain remote code execution ...
WIRTE expands AshTag espionage operations, using phishing & DLL sideloading to target Middle East govts with persistent ...
Written in C++, NANOREMOTE is equipped to perform reconnaissance, execute files and commands, and transfer files to and from ...
Research shows a .NET proxy design flaw enables file writes and RCE through attacker-supplied WSDL in multiple products.