The GlassWorm supply-chain campaign has returned with a new, coordinated attack that targeted hundreds of packages, ...
Learn all the policies, education, and technical strategies that are essential to a complete phishing defense strategy.
GlassWorm campaign injects malware into GitHub Python repos using stolen tokens since March 8, 2026, exposing developers to ...
Hackers use credentials stolen in the GlassWorm campaign to access GitHub accounts and inject malware into Python repositories.
A fake $TEMU crypto airdrop uses the ClickFix trick to make victims run malware themselves and quietly installs a remote-access backdoor.
The Contagious Interview campaign weaponizes job recruitment to target developers. Threat actors pose as recruiters from crypto and AI companies and deliver backdoors such as OtterCookie and ...
Something else to worry about.
VOID#GEIST malware campaign delivers XWorm, AsyncRAT, and Xeno RAT using batch scripts, Python loaders, and explorer.exe ...
Abstract: Traditional malware detection techniques often struggle against the sophisticated obfuscation methods employed by modern malware. To address this challenge, this paper proposes HyperMD, a ...
Researchers have identified the first known Android malware to use generative AI during execution. The malware queries Google’s Gemini model to adapt its behavior across different Android devices. It ...
Researchers have discovered the first known Android malware to use generative AI in its execution flow, using Google’s Gemini model to adapt its persistence across different devices. In a report today ...
Abstract: Rapid malware evolution calls for the creation of novel, imaginative techniques that enhance the accuracy and resilience of traditional detection methods. Here, a hybrid strategy focused on ...