News

According to ReversingLabs' 2025 Software Supply Chain Security Report, 14 of the 23 crypto-related malicious campaigns in ...
CastleRAT and CastleLoader, active since March 2025, spread malware via phishing and GitHub repos, enabling data theft.
Cybersecurity firm HiddenLayer uncovers a “CopyPasta License Attack” that exploits Coinbase’s favored AI coding tool, Cursor.
Security researchers found malware packages using the Ethereum blockchain to conceal malicious commands on GitHub repos.
JavaScript’s low bar to entry has resulted in one of the richest programming language ecosystems in the world. This month’s ...
ReversingLabs reveals hackers using Ethereum Smart contracts in NPM packages to conceal malware URLs, bypass scans, and ...
The 'Scattered Lapsus$ Hunters' group has taken credit for the cyberattack on JLR. The luxury brand, which the Tata Group ...
Scientists at NYU developed a ransomware prototype that uses LLMs to autonomously to plan, adapt, and execute ransomware attacks. ESET researchers, not knowing about the NYU project, apparently ...