DPRK-linked actors use GitHub C2 and LNK phishing in South Korea, enabling persistent PowerShell control and data ...
Behind the beautiful game: Security lessons learned from previous World Cups Who controls access to a career in physical security? Security without limits: why banks need flexible roadmaps The room ...
Abstract: With the growth of cloud computing technology, users can use public computing resources to complete big data analysis tasks such as machine learning at low cost and high efficiency. However, ...
Abstract: Organizations and enterprises have been outsourcing their computation, storage, and workflows to Infrastructure-as-a-Service (IaaS) based cloud platforms. The heterogeneity and high ...
On March 31, 2026, the popular HTTP client Axios experienced a supply chain attack, causing two newly published npm packages ...
Axios 1.14.1 and 0.30.4 injected malicious plain-crypto-js@4.2.1 after npm compromise on March 31, 2026, deploying ...
The multi-stage campaign targeting South Korea uses weaponized Windows shortcuts and GitHub-based command and control to ...
Subscribe to our weekly newsletter for the latest in industry news, expert insights, dedicated information security content and online events.
A series of malicious LNK files targeting users in South Korea has been detected using a multi-stage attack chain that uses ...
A North Korea-nexus threat actor compromised the widely used axios npm package, delivering a cross-platform remote access ...