DPRK-linked actors use GitHub C2 and LNK phishing in South Korea, enabling persistent PowerShell control and data ...
On March 31, 2026, the popular HTTP client Axios experienced a supply chain attack, causing two newly published npm packages ...
A North Korea-nexus threat actor compromised the widely used axios npm package, delivering a cross-platform remote access ...
Hackers hijacked the npm account of the Axios package, a JavaScript HTTP client with 100M+ weekly downloads, to deliver ...
DeepLoad exploits ClickFix and WMI persistence to steal credentials, enabling stealth reinfection after three days.
In the summer of 2024, the threat to maritime shipping in the Red Sea was at its peak. Houthi rebels in Yemen were firing on international vessels, forcing marine traffic to avoid one of the world’s ...
Several Android Auto users report seeing “Voice commands aren’t available right now” in recent days. The issue appears across multiple cars and phones, suggesting it’s not device-specific. Some say ...
A new social engineering campaign is abusing fake CAPTCHA verification pages to trick Windows users into launching StealC information-stealing malware. The attack relies on compromised websites that ...
A fake CAPTCHA scam is tricking Windows users into running PowerShell commands that install StealC malware and steal passwords, crypto wallets, and more. Explore Get the web's best business technology ...
Have you ever wished Excel could do more of the heavy lifting for you? Imagine transforming hours of tedious data cleaning and analysis into just a few clicks. That’s exactly what Microsoft’s ...