The Arkanix Stealer malware can collect and exfiltrate system information, browser data, VPN information, and arbitrary files ...
VOID#GEIST malware campaign delivers XWorm, AsyncRAT, and Xeno RAT using batch scripts, Python loaders, and explorer.exe ...
A new variation of the fake recruiter campaign from North Korean threat actors is targeting JavaScript and Python developers with cryptocurrency-related tasks. The activity has been ongoing since at ...
The Arkanix infostealer combines LLM-assisted development with a malware-as-a-service model, using dual language implementations to maximize reach and establish persistence.
A surge in LummaStealer infections has been observed, driven by social engineering campaigns leveraging the ClickFix technique to deliver the CastleLoader malware. LummaStealer, also known as LummaC2, ...
A Linux-based command-and-control (C2) framework capable of long-term intrusion across cloud and enterprise environments has been further analyzed in new research. Known as VoidLink, the malware ...
Endor Labs launches AURI, a free security platform that embeds directly into AI coding assistants like Cursor and Claude to ...
Operation Dream Job is evolving once again, and now comes through malicious dependencies on bare-bones projects.
ESET researchers have discovered PromptSpy, the first known Android malware to use generative AI, specifically leveraging Gemini to help lock itself on devices and adapt its behavior across different ...