Cybercriminals exploit the increased online shopping activity during holiday sales to launch cyberattacks, targeting vulnerable systems and networks for data breaches, financial fraud, and...
A threat actor, "topnotchdeveloper12," has deployed three malicious npm packages (crypto-keccak, crypto-jsonwebtoken, and crypto-bignumber) disguised as legitimate cryptographic libraries.
These packages contain spyware-infostealer malware that...
PSLoramyra, a sophisticated fileless loader, employs PowerShell, VBS, and BAT scripts to inject and execute malicious payloads directly in memory, which evades traditional security...
Ransomware and extortion groups are increasingly employing sophisticated exfiltration techniques to steal sensitive data from targeted organizations, which are motivated by financial gain and...