Malicious JavaScript code delivered by the AppsFlyer Web SDK hijacked cryptocurrency, potentially in a supply-chain attack.
The campaign, observed in February 2026, has been assessed to share overlaps with a prior campaign mounted by Laundry Bear, a ...
ClickFix campaigns spread MacSync macOS infostealer via malicious Terminal commands since Nov 2025, targeting AI tool users ...
ThreatDown Uncovers First Cyber Attack Abusing Deno JavaScript Runtime for Fileless Malware Delivery
ThreatDown, the corporate business unit of Malwarebytes, today published research documenting what researchers believe to be ...
DRILLAPP JavaScript backdoor targets Ukraine in Feb 2026, abusing Edge debugging features to spy via camera, microphone, and ...
The infamous GlassWorm malware has infected dozens more Open VSX software packages, according to new research.
Hackers use credentials stolen in the GlassWorm campaign to access GitHub accounts and inject malware into Python ...
Recent social engineering schemes involving WordPress and Microsoft’s Windows Terminal show that this relatively basic tactic ...
Tycoon2FA has become a leading phishing-as-a-service (PhaaS) platforms, enabling campaigns that reach over 500,000 ...
GhostClaw poses as an OpenClaw installer package, stealing system credentials and sensitive data before deploying a ...
The Cybersecurity and Infrastructure Security Agency has ordered federal agencies to patch three critical iOS vulnerabilities ...
XDA Developers on MSN
Google kept featuring this Chrome extension for months after it turned malicious
How can an extension change hands with no oversight?
Some results have been hidden because they may be inaccessible to you
Show inaccessible results