OAuth redirection is being repurposed as a phishing delivery path. Trusted authentication flows are weaponized to move users from legitimate sign‑in pages to attacker‑controlled infrastructure.
A threat actor has weaponized Anthropic’s Claude Code to breach the Mexican government’s systems and steal over 150GB of data.
While the Windows maker did not attribute the activity to a specific threat actor, the use of VS Code tasks and Vercel ...
Chainguard, the trusted source for open source, today announced it has expanded Chainguard Libraries coverage across Python, Java, and JavaScript, with customers seeing 94% coverage across the Python ...
In an open letter to Google and the Android developer community, Keep Android Open argues that the new policy threatens ...
Linked to North Korean fake job-recruitment campaigns, the poisoned repositories are aimed at establishing persistent C2 ...
PromptSpy, discovered by ESET, is the first known Android malware to integrate generative AI into its execution flow.
A developer-targeting campaign leveraged malicious Next.js repositories to trigger a covert RCE-to-C2 chain through standard ...
The Arkanix Stealer malware can collect and exfiltrate system information, browser data, VPN information, and arbitrary files ...
Researchers warn malicious packages can harvest secrets, weaponize CI systems, and spread across projects while carrying a ...
Sample files for Azul are kept in a Simple Storage Service (S3) compatible binary large object (blob) store, and processed ...
A Russian hacker was recently seen brute-forcing their way into hundreds of firewalls - but what makes this campaign really stand out is the fact that the seemingly low-skilled threat actor was able ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results