For years, security teams treated ransomware as a technological problem. Security teams hardened backup systems, deployed endpoint detection, practiced incident…
Cybercriminals have adopted a deceptive strategy to compromise users searching for common software applications online. These attackers are using search…
A highly sophisticated infostealer malware disguised as a legitimate npm UI component library has been targeting developers through the ansi-universal-ui…
A malware delivery campaign detailed by Blackpoint researchers employs an impressive array of tricks to deliver an infostealer to employees…
Cybersecurity researchers have disclosed details of a new campaign that combines ClickFix-style fake CAPTCHAs with a signed Microsoft Application Virtualization…
Building on the CustomerFirst unit, which was unveiled last week, the UK government has announced that Meta is investing $1m…
Nonprofit security organization Shadowserver has found over 6,000 SmarterMail servers exposed online and likely vulnerable to attacks exploiting a critical…
MEDUSA, an AI-first Static Application Security Testing (SAST) tool boasting 74 specialized scanners and over 180 AI agent security rules….
Threat actors have successfully exploited a design flaw in GitHub’s fork architecture to distribute malware disguised as the legitimate GitHub…
Ravie LakshmananJan 27, 2026Web Security / Malware Cybersecurity researchers have discovered a JScript-based command-and-control (C2) framework called PeckBirdy that has…
A judge has ordered the Kingdom of Saudi Arabia (KSA) to pay compensation of £3m to a London-based dissident who…
A dangerous phishing campaign is targeting cryptocurrency holders through video calls that use artificial intelligence to create fake versions of…
