North Korea-linked ScarCruft’s Ruby Jumper uses Zoho WorkDrive C2 and USB malware to breach air-gapped systems for ...
Trojanized gaming tools and new Windows RATs like Steaelite enable data theft, ransomware, and persistent remote control.
The security researchers from Zscaler ThreatLabz have also discovered five new tools deployed by the North Korean hacking ...
A critical vulnerability in the Junos OS Evolved network operating system running on PTX Series routers from Juniper Networks ...
A hacker exploited Anthropic PBC’s artificial intelligence chatbot to carry out a series of attacks against Mexican government agencies, resulting in the theft of a huge trove of sensitive tax and ...
A hacker jailbroke Claude to steal 150GB of Mexican government data in a month-long campaign. CrowdStrike's latest threat report shows it's part of a wider pattern — and maps four domains most ...