Threat actors are now abusing DNS queries as part of ClickFix social engineering attacks to deliver malware, making this the first known use of DNS as a channel in these campaigns.
A developer-targeting campaign leveraged malicious Next.js repositories to trigger a covert RCE-to-C2 chain through standard ...
While the Windows maker did not attribute the activity to a specific threat actor, the use of VS Code tasks and Vercel domains to stage malware is a tactic that has been adopted by North Korea-linked ...
Linked to North Korean fake job-recruitment campaigns, the poisoned repositories are aimed at establishing persistent C2 ...
A fake CAPTCHA scam is tricking Windows users into running PowerShell commands that install StealC malware and steal passwords, crypto wallets, and more.
Oasis Security, the identity security platform, today released new threat research exploring a vulnerability chain in OpenClaw that allows any website to silently take full control of a developer's AI ...
Four rogue NuGet packages and one npm package stole ASP.NET Identity data, deployed C2 backdoors, and reached over 50,000 ...
Microsoft is previewing an open-source command-line tool designed to speed up Windows application development, testing, and delivery.
A new variation of the fake recruiter campaign from North Korean threat actors is targeting JavaScript and Python developers ...
A critical OpenClaw flaw allowed malicious websites to connect to locally running agents, brute-force passwords without ...
The Islamic Republic of Iran is, quite possibly, at its weakest point since its founding, in 1979. In June, Israeli and U.S. attacks destroyed its uranium enrichment capacity and many of its air ...
Slop’ pull requests from LLMs are deluging maintainers, and you can generate small utility functions on your own in seconds. The open source world is grappling with AI.