News

Hackers can exploit vulnerabilities in a generative artificial intelligence assistant integrated across GitLab's DevSecOps platform to manipulate the model's ...
Misconfigured Docker API instances have become the target of a new malware campaign that transforms them into a ...
Hackers trojanized KeePass to spread malware via fake ads. Learn how trusted apps are exploited – and how to stay safe from ...
Cybercriminals are promising free access to premium software if TikTok users run PowerShell scripts, but they instead install information-stealing malware.
Detection as code (DaC) is a powerful way for security teams to streamline rule development, automate threat detection, and ...
A major threat actor has been crippled by an international law enforcement action, as the Lumma infostealer malware operation ...
Security experts at Socket’s Threat Research team, have discovered a campaign in the NPM ecosystem, which includes Malicious ...
AI-powered automation will give rise to the " zero-knowledge threat actor ." Threat actors will leverage AI tools and ...
In addition to emails, websites, and USB sticks, malware is now also spreading via TikTok. Although indirect, the malicious ...
A suspected Chinese crew has been exploiting a now-patched remote code execution (RCE) flaw in Trimble Cityworks to break ...
Microsoft Threat Intelligence observed the persistent growth and operational sophistication of Lumma Stealer, an ...
The China-linked hacking group Earth Ammit has launched multi-wave attacks in Taiwan and South Korea to disrupt the drone ...