Hackers use credentials stolen in the GlassWorm campaign to access GitHub accounts and inject malware into Python repositories.
As users (and detection tools) have gotten better at identifying the signs of a malware infection and savvy enough to avoid them in the first place, some cybercriminals have changed tactics.
“Most of the time when data is available, it’s not the dark web, it’s the clear web,” says Hunt. While it’s true that data ...
SocksEscort sold proxy services on the open web, but was actually routing traffic through compromised routers and internet-connected devices.
A new malware strain dubbed Slopoly, likely created using generative AI tools, allowed a threat actor to remain on a compromised server for more than a week and steal data in an Interlock ransomware ...
AI-generated Slopoly malware used by Hive0163 in 2026 attacks maintained access for over a week, highlighting how AI ...
Storm-2561 uses SEO poisoning to push fake VPN downloads that install signed trojans and steal VPN credentials. Active since 2025, Storm-2561 mimics trusted brands and abuses legitimate services. This ...
Your weekly cybersecurity roundup covering the latest threats, exploits, vulnerabilities, and security news you need to know.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results