News

CastleRAT and CastleLoader, active since March 2025, spread malware via phishing and GitHub repos, enabling data theft.
Pro tip, don't install PowerShell commands without approval A team of data thieves has doubled down by developing its ...
Security researchers found malware packages using the Ethereum blockchain to conceal malicious commands on GitHub repos.
ReversingLabs reveals hackers using Ethereum Smart contracts in NPM packages to conceal malware URLs, bypass scans, and ...
IntroductionAPT37 (also known as ScarCruft, Ruby Sleet, and Velvet Chollima) is a North Korean-aligned threat actor active since at least 2012. APT37 primarily targets South Korean individuals ...
Cybercriminals have invented an insidious way to seize control of vulnerable AIs, and the models you use on your phone or ...
Scientists at NYU developed a ransomware prototype that uses LLMs to autonomously to plan, adapt, and execute ransomware attacks. ESET researchers, not knowing about the NYU project, apparently ...
Cybersecurity firm HiddenLayer uncovers a “CopyPasta License Attack” that exploits Coinbase’s favored AI coding tool, Cursor.
Claude AI has been used for fake remote jobs in North Korea to pass interviews and keep high-paying roles. How far will this ...
Foundational Pillars Of Cloud Automation Before we get into the fancy tools and multi-cloud setups, let’s talk ...