The Tycoon2FA phishing kit now supports device-code phishing attacks and abuses Trustifi click-tracking URLs to hijack ...
Tycoon2FA has returned with new device-code phishing attacks targeting Microsoft 365 users through legitimate OAuth login ...
A desktop app that lets users stream any movie, TV series, or anime for free and without ads hit the top of GitHub’s global ...
Socket raises $60M to expand AI-driven software supply chain security and protect developers from cyber threats worldwide.
Attackers performed an email takeover attack on a dormant maintainer account and published new node-ipc versions containing ...
Copycat hackers are competing to win $1,000 for the largest supply chain attack using Shai-Hulud, an open-sourced worm that has brought down a few major open-source projects. Malicious NPM packages ...
A critical security vulnerability impacting the Funnel Builder plugin for WordPress has come under active exploitation in the wild to inject malicious JavaScript code into WooCommerce checkout pages ...
Google on Wednesday published exploit code for an unfixed vulnerability in its Chromium browser codebase that threatens ...
Google has accidentally leaked details about an unfixed issue in Chromium that keeps JavaScript running in the background ...
Hulud payload to steal CI/CD secrets from Linux-based automation environments. The malware executes during npm install and ...
A legacy Windows scripting utility tied to Internet Explorer is still being used in modern malware campaigns, researchers say ...
A token leaks. A bad package slips in. A login trick works. An old tool shows up again. At first, it feels like the usual mess. Then you see the pattern: attackers are not always breaking in. They are ...