A convincing Microsoft lookalike tricks users into downloading malware that steals passwords, payments, and account access.
VnExpress International on MSN
Vietnamese teen accused of creating malware that infected 94,000 computers worldwide
A 12th-grade student in Thanh Hoa Province has been accused of developing malicious software and selling it to cybercrime syndicates, enabling them to allegedly hijack over 94,000 computers globally.
DPRK-linked actors use GitHub C2 and LNK phishing in South Korea, enabling persistent PowerShell control and data ...
A new variation of the fake recruiter campaign from North Korean threat actors is targeting JavaScript and Python developers with cryptocurrency-related tasks. The activity has been ongoing since at ...
Over 1,700 malicious packages since Jan 2025 fuel cross-ecosystem supply chain attacks, enabling espionage and financial ...
The compromised packages, linked to the Trivy breach, executed a three‑stage payload targeting AWS, GCP, Azure, Kubernetes ...
VnExpress International on MSN
How a self-taught Vietnamese high schooler built the malware that infected 94,000 computers ...
International cybersecurity firms had been tracking a sophisticated malware strain called PXA Stealers for months, tracing it ...
A critical supply chain attack has compromised the popular JavaScript library axios, leading to developers unknowingly ...
Although executed by different attackers – Axios by North Korean-linked goons, and Trivy et al. by a loosely knit band of ...
Threat actors are now abusing DNS queries as part of ClickFix social engineering attacks to deliver malware, making this the first known use of DNS as a channel in these campaigns. ClickFix attacks ...
A Python package presented as a privacy-first shortcut to AI models has been unmasked as a supply-chain threat that quietly captures user prompts, leans on a private university service without ...
When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works. GTIG finds threat actors are cloning mature AI models using distillation attacks Sophisticated ...
一些您可能无法访问的结果已被隐去。
显示无法访问的结果