Security researchers detected artificial intelligence-generated malware exploiting the React2Shell vulnerability, allowing ...
Hackers planted 341 malicious AI skills targeting crypto traders on OpenClaw's ClawHub marketplace, stealing wallet data ...
The FBI and an international coalition of its counterparts took action early last year. In May, they said they seized 2,300 domains, command-and-control infrastructure, and crime marketplaces that had ...
Campaign combines stolen Telegram accounts, fake Zoom calls and ClickFix attacks to deploy infostealer malware ...
UNC1069 uses a mix of Business Telegram Compromise, deepfakes, and malware.
Implementing these 10 essential cybersecurity habits in 2026 protects against phishing, ransomware, and identity theft while securing personal and business data.
North Korean hackers have launched a set of seven new malware products seeking to infiltrate user devices to harvest data and steal assets from crypto and fintech firms, according to Mandiant.
North Korean state hackers are targeting crypto firms with several unique pieces of malware deployed alongside multiple scams ...
Google’s Mandiant reports that a North Korea-linked hacker group used fake Zoom calls to deploy malware against a crypto firm ...
A newly documented Linux botnet named SSHStalker is using the IRC (Internet Relay Chat) communication protocol for command-and-control (C2) operations.
North Korean hackers are running tailored campaigns using AI-generated video and the ClickFix technique to deliver malware for macOS and Windows to targets in the cryptocurrency sector.
Exploiting .lnk files is a strategy that has been used for years and still works, says new report from Forcepoint.