Attackers are increasingly abusing Microsoft’s legacy MSHTA utility to silently deliver malware, stealers, and persistent ...
A multi-stage attack on Linux devices began with an exposed F5 BIG-IP edge appliance and pivoted to an internal Confluence ...
A legacy Windows scripting utility tied to Internet Explorer is still being used in modern malware campaigns, researchers say ...
GitHub confirmed attackers stole 3,800 internal repositories via a poisoned VS Code extension. The same threat group, TeamPCP ...
Hulud payload to steal CI/CD secrets from Linux-based automation environments. The malware executes during npm install and ...
The Shai-Hulud supply-chain malware campaign is exploiting the automated systems developers trust to publish software safely.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results