Threat actors are publishing clean extensions that later update to depend on hidden payload packages, bypassing marketplace ...
ClickFix campaigns spread MacSync macOS infostealer via malicious Terminal commands since Nov 2025, targeting AI tool users ...
The Contagious Interview campaign weaponizes job recruitment to target developers. Threat actors pose as recruiters from crypto and AI companies and deliver backdoors such as OtterCookie and ...
Forget stolen credentials and misconfigurations; AI means vulnerability exploits that beat patching cycles are the top cause of compromises in the cloud.
Google report: AI is accelerating cloud cyberattacks, and one weak link stands out ...
Infosecurity spoke to several experts to explore what CISOs should do to contain the viral AI agent tool’s security vulnerabilities ...
State of Automotive Software Development Report. The transition of the automobile from a mechanical marvel to a sprawling, intricate digital landscape has reached a volatile ...
Hackers use credentials stolen in the GlassWorm campaign to access GitHub accounts and inject malware into Python repositories.
DRILLAPP JavaScript backdoor targets Ukraine in Feb 2026, abusing Edge debugging features to spy via camera, microphone, and ...
Storm-2561 uses SEO poisoning to push fake VPN downloads that install signed trojans and steal VPN credentials. Active since 2025, Storm-2561 mimics trusted brands and abuses legitimate services. This ...