News

GLOBAL GROUP ransomware, launched in June 2025, targets industries across multiple regions with AI-powered negotiation and ...
A new state-backed campaign using HazyBeacon malware targets Southeast Asian governments to collect sensitive data via AWS ...
Discover how AsyncRAT evolved from GitHub release to a widespread malware tool, spawning dangerous variants like DCRat and ...
AI agents bring productivity but also identity risks in cloud environments. Learn how Astrix secures non-human identities.
North Korean hackers continue attacking open-source software via npm packages. 67 new malicious packages with XORIndex Loader ...
A fake CAPTCHA is all it takes. Interlock ransomware is back—now pushing a stealthy PHP RAT via “FileFix,” a spin on ClickFix ...
The JavaScript code acts as a traffic distribution system (TDS), using IP filtering techniques to redirect users to fake ...
Explore runtime reachability and why function-level execution is key to reducing false positives in vulnerability scanning.
From Bluetooth exploits in vehicles to macOS backdoors and GitHub phishing tricks—this week’s threats go deeper than they ...