A new Linux variant of Bifrost, called Bifrose, was detected employing a clever evasion tactic by utilizing...
malicious cyber actors
A newly discovered phishing kit has been observed impersonating the login pages of prominent cryptocurrency services as...
Cybercriminals are leveraging the flexibility of SVG (Scalable Vector Graphics) files for the dissemination of the GUloader...
Cyber adversaries utilize ZIP files as a means to weaponize them, leveraging the ease of concealing malicious...
Recent discoveries by Phylum indicate that a series of counterfeit npm packages identified on the Node.js repository...