Attackers are increasingly abusing Microsoft’s legacy MSHTA utility to silently deliver malware, stealers, and persistent ...
FrostyNeighbor, a long-running cyberespionage actor apparently aligned with the interests of Belarus, has been active recently in campaigns ...
Ghostwriter’s March 2026 Ukraine attacks use PDF lures and geofencing to deploy Cobalt Strike on government targets.
The world’s largest open-source registry, node package manager (npm), has been hit by another fast-moving malware attack, ...
A new infostealer variant targets macOS users by spoofing Apple, Microsoft, and Google and then then gets to work searching ...
A known Belarussian cyber-espionage group is back with a threat campaign against targets in Eastern Europe that uses spear-phishing to deliver malicious payloads to Eastern European government and ...
If you are building a simple dashboard or a form-based application, the traditional JSON API (REST or GraphQL) approach is ...
A legacy Windows scripting utility tied to Internet Explorer is still being used in modern malware campaigns, researchers say ...
Attackers performed an email takeover attack on a dormant maintainer account and published new node-ipc versions containing ...
Claude Code has made the digital photo tool Adobe Lightroom functional on Linux. The project began with a very simple prompt.
TanStack has released a detailed postmortem describing a sophisticated supply-chain attack that compromised 42 npm packages ...