The Contagious Interview campaign weaponizes job recruitment to target developers. Threat actors pose as recruiters from crypto and AI companies and deliver backdoors such as OtterCookie and ...
Researchers say they have uncovered a takedown-resistant botnet of 14,000 routers and other network devices—primarily made by Asus—that have been conscripted into a proxy network that anonymously ...
Attackers are using fake Claude Code install pages and malicious search ads to spread infostealer malware targeting Windows and macOS systems.
Malware is evolving to evade sandboxes by pretending to be a real human behind the keyboard. The Picus Red Report 2026 shows 80% of top attacker techniques now focus on evasion and persistence, ...
The Russian state-sponsored APT28 threat group is using a custom variant of the open-source Covenant post-exploitation framework for long-term espionage operations.
Large-scale evolutionary analysis shows most zoonotic viruses emerge without prior adaptation, while passing through a laboratory leaves detectable genetic signatures, offering a new tool to interpret ...
A new University of California San Diego study published in Cell challenges a long-standing assumption about how animal ...
Researchers have devised a new tool for discerning between naturally occurring viral outbreaks and those resulting from lab ...
Orthohantaviruses, such as the Puumala virus, are widespread in Europe, causing flu-like illnesses and severe kidney damage ...
A new University of California San Diego study published in Cell challenges a long-standing assumption about how animal ...
Researchers may have stumbled upon 'ground zero' for a deadly virus that kills nine in ten patients infected with it.
In January 2026, India reported two new cases of the Nipah virus in the West Bengal area. One of the patients is reportedly showing signs of improvement, while the other is receiving critical care.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results