Operation Dream Job is evolving once again, and now comes through malicious dependencies on bare-bones projects.
A new variation of the fake recruiter campaign from North Korean threat actors is targeting JavaScript and Python developers ...
Researchers show AI assistants can act as stealth C2 proxies, enabling malware communication, evasion, and runtime attack ...
North Korean IT operatives use stolen LinkedIn accounts, fake hiring flows, and malware to secure remote jobs, steal data, ...
Researchers have revealed that bad actors are targeting dYdX and using malicious packages to empty its user wallets.
The FBI warned in 2023 that “thousands of skilled IT workers” were moving abroad from North Korea and setting up as freelance IT professionals, warning recruiters to be wary of remote workers who ...
Open source packages published on the npm and PyPI repositories were laced with code that stole wallet credentials from dYdX developers and backend systems and, in some cases, backdoored devices, ...
StealC malware campaign exploits fake CAPTCHA pages to steal sensitive data while blending into normal system activity.
Security researchers uncover the first malicious Outlook add-in, hijacked to steal 4,000+ Microsoft credentials in new supply chain attack.
Experts have identified the three digital lifestyles most targeted by cyber criminals – here’s what they are, and what you ...
Researchers have discovered the first known Android malware to use generative AI in its execution flow, using Google's Gemini ...