News
GLOBAL GROUP ransomware, launched in June 2025, targets industries across multiple regions with AI-powered negotiation and ...
A new state-backed campaign using HazyBeacon malware targets Southeast Asian governments to collect sensitive data via AWS ...
Discover how AsyncRAT evolved from GitHub release to a widespread malware tool, spawning dangerous variants like DCRat and ...
AI agents bring productivity but also identity risks in cloud environments. Learn how Astrix secures non-human identities.
North Korean hackers continue attacking open-source software via npm packages. 67 new malicious packages with XORIndex Loader ...
A fake CAPTCHA is all it takes. Interlock ransomware is back—now pushing a stealthy PHP RAT via “FileFix,” a spin on ClickFix ...
The JavaScript code acts as a traffic distribution system (TDS), using IP filtering techniques to redirect users to fake ...
Explore runtime reachability and why function-level execution is key to reducing false positives in vulnerability scanning.
From Bluetooth exploits in vehicles to macOS backdoors and GitHub phishing tricks—this week’s threats go deeper than they ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results