A wave of crypto hacks and attacks followed the Drift exploit, hitting at least 12 entities, including Rhea Finance and Grinex, this week.
North Korea's Sapphire Sleet uses fake job offers and phony Zoom updates to deliver ClickFix attacks that steal credentials ...
Hackers are exploiting a critical vulnerability in Marimo reactive Python notebook to deploy a new variant of NKAbuse malware ...
Malwarebytes recently uncovered a new malicious campaign targeting the Windows Update service. Focused on French-speaking users, the campaign uses layered obfuscation techniques to deliver multiple ...
Claude Mythos finds thousands of zero-days as Anthropic launches Project Glasswing, enhancing defenses but exposing AI ...
The Medusa ransomware group is operating at a fast pace by leveraging zero-days and quickly exploiting new bugs and breached ...
The financially motivated cybercriminal threat actor Storm-1175 operates high-velocity ransomware campaigns that weaponize ...
Cookie-gated PHP web shells enable persistent Linux RCE via cron-based re-creation, reducing detection in routine traffic ...
Cookie-gated PHP webshells use obfuscation, php-fpm execution, and cron-based persistence to evade detection in Linux hosting ...
ROCHESTER, Ind. — A northern Indiana man is behind bars after police say he was allegedly buying narcotics on the dark web and distributing them across Fulton County. Tristin Shell, 18, of Rochester, ...
Don't let hackers take over your iPhone. AI image: ChatGPT/Cult of Mac Update: The sophisticated DarkSword hacking technique that came to light last week — capable of silently taking over iPhones the ...
A powerful iPhone-hacking technique known as DarkSword has been discovered in use by Russian hackers. It can take over devices running iOS 18 that simply visit infected websites. “A vast number of iOS ...