A massive resurgence of the Sha1-Hulud supply chain malware has struck the open-source ecosystem, compromising over 800 npm packages and…
A new era of web-delivered malware has arrived with EtherHiding, a technique that fundamentally reshapes how attackers distribute and rotate…
The Shai Hulud npm worm has re-emerged, launching an aggressive new attack on the software development world. This worm, which…
Some cybersecurity advice has been around for ages: Frequently change passwords, avoid public Wi-Fi. But most experts say a lot…
Harvard University disclosed over the weekend that its Alumni Affairs and Development systems were compromised in a voice phishing attack,…
India-aligned threat group Dropping Elephant has launched a sophisticated multi-stage cyberattack targeting Pakistan’s defense sector using a Python-based remote access…
Cybersecurity researchers have uncovered a sophisticated supply-chain attack targeting Python developers through a malicious package distributed via the Python Package…
Hundreds of trojanized versions of well-known packages such as Zapier, ENS Domains, PostHog, and Postman have been planted in the…
In October 2025, a significant breach exposed the internal workings of APT35, also known as Charming Kitten, a cyber unit…
As generative AI pushes the speed of software development, it is also enhancing the ability of digital attackers to carry…
Security researchers have published a proof-of-concept exploit for a critical remote code execution vulnerability in W3 Total Cache, one of…
24 Nov True Cybersecurity Story: How FreakyClown Robs Banks Posted at 08:43h in Blogs by Taylor Fox This week in…