This app isn’t about to become a billion-dollar company. It can remember your collection, but only if you return to it using the same computer or phone. Someone without technical skills may struggle ...
The Coruna exploit kit has 23 exploits targeting iOS devices, previously used in Russian attacks and now in cybercrime ...
Google uncovered Coruna iOS exploit kit with 23 exploits across five chains targeting iPhones running iOS 13–17.2.1.
Researchers link Silver Dragon APT to APT41 after attacks on government entities using Cobalt Strike, DNS tunneling, and Google Drive-based C2.
Overview On February 11, 2026, NSFOCUS CERT monitored Microsoft’s release of its February security update patches, addressing 59 security issues across widely used products such as Windows, Azure, ...
A compromised Chrome extension with 7,000 users was updated to deploy malware, strip security headers, and steal cryptocurrency wallet seed phrases.
According to Veracode, though, there is also an accelerating pace of software releases causing new code to be added more ...
AI-enabled attacks surge 89% as breakout time falls to 29 minutes; AI tools and development platforms are actively exploited AUSTIN, Texas ...
The Microsoft Defender team has discovered a coordinated campaign targeting software developers through malicious repositories posing as legitimate Next.js projects and technical assessment materials, ...
Linked to North Korean fake job-recruitment campaigns, the poisoned repositories are aimed at establishing persistent C2 ...
A malicious NPM package, ambar-src, mimicking a popular JavaScript framework, was downloaded nearly 50,000 times in a few ...
Attackers used “technical assessment” projects with repeatable naming conventions to blend in cloning and build workflows, ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results