Hackers Exploit SVG Image Files for GUloader Malware Distribution
Cybercriminals are leveraging the flexibility of SVG (Scalable Vector Graphics) files for the dissemination of [...]
Cybercriminals are leveraging the flexibility of SVG (Scalable Vector Graphics) files for the dissemination of [...]
Cyber adversaries utilize ZIP files as a means to weaponize them, leveraging the ease of [...]
Recent discoveries by Phylum indicate that a series of counterfeit npm packages identified on the [...]
Threat actors exploit SSH credentials to gain unauthorized access to systems and networks, executing malicious [...]
Researchers uncovered an advanced cyberattack involving a dormant Python Package Index (PyPI) package called Django-log-tracker, [...]