ThreatDown Uncovers First Cyber Attack Abusing Deno JavaScript Runtime for Fileless Malware Delivery
ThreatDown’s EDR team discovered a sophisticated, multi-stage attack chain during an active investigation; the first documented case of attackers abusing the Deno runtime as a malware execution ...
Google's latest threat report warns that third-party tools are now prime targets for attackers - and businesses have just days to keep them secure.
Scammers are using cloned versions of popular AI coding tools to spread info-stealing malware through fake installation ...
Claude Code Security spooked investors but misses the bigger problem. The real risk to enterprises is in SaaS integrations ...
A new ClickFix attack variant uses fake CAPTCHA pages instructing victims to paste and execute malicious commands in Windows Terminal.
Generative AI is raising the risk of dangling DNS attack vectors, as the orphaned resources are no longer just a phishing ...
Thousands of iPhones were compromised using the Coruna exploit kit, which chained 23 iOS vulnerabilities into advanced attacks used for espionage and cybercrime.
The nonprofit that oversees Wikipedia briefly enforced a 'read-only' mode on Thursday morning as users spotted code designed ...
The Wikimedia Foundation suffered a security incident today after a self-propagating JavaScript worm began vandalizing pages and modifying user scripts across multiple wikis.
Authorities dismantle Tycoon 2FA phishing service linked to 64,000 attacks, millions of emails, and breaches at nearly 100,000 organizations worldwide ...
Security researchers have uncovered a hacking toolkit designed to compromise Apple iPhones and steal cryptocurrency wallet ...
The Coruna exploit kit has 23 exploits targeting iOS devices, previously used in Russian attacks and now in cybercrime ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results