New versions of the XWorm backdoor are being distributed in phishing campaigns after the original developer, XCoder, ...
A single security breach can jeopardize everything you’ve built. The theft of intellectual property and confidential customer data can result in a cascade of consequences, from hefty financial losses ...
The Shutter team anticipates that batched threshold encryption (BTE) is a potential way to address the drawbacks of both ...
A new phishing and malware distribution toolkit called MatrixPDF allows attackers to convert ordinary PDF files into ...
The ProSpy campaign, discovered in June 2025, is believed to have been ongoing since 2024, leveraging deceptive websites ...
The Python Package Index (PyPI), run by the Python Software Foundation, has officially invalidated all the publishing tokens that were stolen in the GhostAction supply chain attack that happened ...
Cyberspies affiliated with the Chinese government impersonated a key House Republican lawmaker as part of a plot to undermine national security, Axios reported on Monday. "Hackers sent emails ...
Manufacturers operate in one of the most unforgiving threat environments and face a unique set of pressures that make attacks particularly damaging New spyware campaigns target privacy-conscious ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results