A newly discovered phishing kit has been observed impersonating the login pages of prominent cryptocurrency services as...
malicious cyber actors
Cybercriminals are leveraging the flexibility of SVG (Scalable Vector Graphics) files for the dissemination of the GUloader...
Cyber adversaries utilize ZIP files as a means to weaponize them, leveraging the ease of concealing malicious...
Recent discoveries by Phylum indicate that a series of counterfeit npm packages identified on the Node.js repository...
Threat actors exploit SSH credentials to gain unauthorized access to systems and networks, executing malicious activities by...