Cyber adversaries utilize ZIP files as a means to weaponize them, leveraging the ease of concealing malicious...
Security Update
Recent discoveries by Phylum indicate that a series of counterfeit npm packages identified on the Node.js repository...
Threat actors exploit SSH credentials to gain unauthorized access to systems and networks, executing malicious activities by...
A newly identified, sophisticated malware coded in C# has emerged. Dubbed Xeno RAT, this malware boasts advanced...
Researchers uncovered an advanced cyberattack involving a dormant Python Package Index (PyPI) package called Django-log-tracker, which was...