At the upcoming Lived! 360 Orlando 2025 conference, Tim Purdum, Engineering Manager and Senior Software Engineer at dymaptic, ...
Ten typosquatted npm packages (Jul 4, 2025) delivered a 24MB PyInstaller info stealer using 4 obfuscation layers; ~9,900 ...
EtherHiding’: Nation-state and cybercriminal groups are leveraging smart contracts as command-and-control servers for ...
The North Korean threat actor linked to the Contagious Interview campaign has been observed merging some of the functionality ...
Attackers are using the open-source red-team tool RedTiger to build an infostealer that collects Discord account data and ...
North Korean threat group Famous Chollima is using blockchain technology to hide malware payloads in smart contracts, which ...
Researchers at tech giant Google's Threat Intelligence team highlight a years-old exploit that is now being used by North ...
Chrome faces its sixth zero-day attack in 2025 as Google patches critical V8 engine flaw CVE-2025-10585 discovered by Threat ...
Google’s Threat Intelligence Group has linked North Korean hackers to EtherHiding, blockchain malware previously used by ...
North Korean hackers are now using a blockchain-based method known as EtherHiding to deliver malware to facilitate their ...
Cybersecurity researchers at Google’s Threat Intelligence Group (GTIG) have uncovered a sophisticated hacking campaign by a North Korean state-linked group ...
What SquareX discovered are malicious extensions that can spoof the legitimate AI sidebars people use for queries. Their goal ...