Microsoft’s investigation into RedVDS services and infrastructure uncovered a global network of disparate cybercriminals ...
The Python Package Index (PyPI), run by the Python Software Foundation, has officially invalidated all the publishing tokens that were stolen in the GhostAction supply chain attack that happened ...
The WebRAT malware is now being distributed through GitHub repositories that claim to host proof-of-concept exploits for recently disclosed vulnerabilities. Previously spread through pirated software ...
We’ve recently seen how ChatGPT was used to trick Mac users into installing MacStealer, and now a different tactic has been found to persuade users to install a version of MacSync Stealer. The Mac ...
The Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency, and Canadian Centre for Cyber Security have released an update to the Malware Analysis Report BRICKSTORM Backdoor ...
Remote-access malware discovered aboard an Italian passenger ferry has triggered a major international cybersecurity investigation. Whether it’s a watertight case remains to be seen, but French ...
Darktrace threat researchers have identified and analyzed a new variant of BeaverTail, a malware family associated with North Korea’s Lazarus Group activity. BeaverTail is a JavaScript-based ...
When he's not battling bugs and robots in Helldivers 2, Michael is reporting on AI, satellites, cybersecurity, PCs, and tech policy.