Rogue npm Packages Mimic Telegram Bot API to Plant SSH Backdoors on Linux SystemsThree malicious npm packages disguised as a Telegram bot library have been found, containing SSH backdoors and data exfiltration functionalities.
AI has ushered in a new kind of hackerHackers are exploiting AI models for cyberattacks by embedding malicious code in open-source language models.
Fake file converter tools are on the rise - here's what you need to knowBeware of fake file converters downloading malware that can lead to identity theft or ransom demands.
Russian Hackers Exploit CVE-2025-26633 via MSC EvilTwin to Deploy SilentPrism and DarkWispA Russian hacking group exploits a zero-day vulnerability in Windows, deploying backdoors SilentPrism and DarkWisp.
Masquerading payment npm package installs backdoorA malicious npm package exploits payment transactions by embedding a reverse shell to hijack server control.Threat actors are increasingly targeting payment systems to evade scrutiny by embedding malicious code.
Google warns that fake North Korean IT workers have expanded to EuropeNorth Korean fake IT workers pose a growing global threat, extending operations from the US to Europe and employing sophisticated tactics.
Rogue npm Packages Mimic Telegram Bot API to Plant SSH Backdoors on Linux SystemsThree malicious npm packages disguised as a Telegram bot library have been found, containing SSH backdoors and data exfiltration functionalities.
AI has ushered in a new kind of hackerHackers are exploiting AI models for cyberattacks by embedding malicious code in open-source language models.
Fake file converter tools are on the rise - here's what you need to knowBeware of fake file converters downloading malware that can lead to identity theft or ransom demands.
Russian Hackers Exploit CVE-2025-26633 via MSC EvilTwin to Deploy SilentPrism and DarkWispA Russian hacking group exploits a zero-day vulnerability in Windows, deploying backdoors SilentPrism and DarkWisp.
Masquerading payment npm package installs backdoorA malicious npm package exploits payment transactions by embedding a reverse shell to hijack server control.Threat actors are increasingly targeting payment systems to evade scrutiny by embedding malicious code.
Google warns that fake North Korean IT workers have expanded to EuropeNorth Korean fake IT workers pose a growing global threat, extending operations from the US to Europe and employing sophisticated tactics.
ActiveX blocked by default in Microsoft 365Microsoft 365 will disable all ActiveX controls by default to enhance security against malware attacks.
Warning to developers: Stay away from these 10 VSCode extensionsMalicious extensions cleverly mimic legitimate tools, making user detection difficult.
ActiveX blocked by default in Microsoft 365Microsoft 365 will disable all ActiveX controls by default to enhance security against malware attacks.
Warning to developers: Stay away from these 10 VSCode extensionsMalicious extensions cleverly mimic legitimate tools, making user detection difficult.
Why Mac users can no longer ignore cybersecurity risks - London Business News | Londonlovesbusiness.comMac devices are increasingly vulnerable to malware, debunking the myth of inherent safety against cyber threats.There is a significant need for enhanced cybersecurity practices among Mac users.
It's time to update Chrome ASAP - again! - to fix this critical flawGoogle Chrome 134.0.6998.117 includes critical security updates that protect against a vulnerability allowing malware infection.