The Contagious Interview campaign weaponizes job recruitment to target developers. Threat actors pose as recruiters from crypto and AI companies and deliver backdoors such as OtterCookie and ...
Abstract: With the advancement of service computing technology, software developers tend to consume a variety of Web APIs (Application Programming Interfaces, also named Web services) from Web API ...
Cybersecurity researchers have discovered a new campaign attributed to a China-linked threat actor known as UAT-8099 that took place between late 2025 and early 2026. The activity, discovered by Cisco ...
Internet security watchdog Shadowserver tracks nearly 800,000 IP addresses with Telnet fingerprints amid ongoing attacks exploiting a critical authentication bypass vulnerability in the GNU InetUtils ...
Google is testing the Web Install API, a new standard that lets websites install Progressive Web Apps directly from the web across different browsers. Google has started to test the Web Install API, a ...
A long-running threat group operating in South Asia has shifted its cyber-espionage tactics from deploying infostealers to using more advanced Python backdoors against Microsoft Windows-based targets ...
Abstract: With the increasing popularity of Internet services, developers can reuse or mix these services to create new applications (such as mashups) to improve development efficiency. In previous ...
July 23, 2025 update – Expanded analysis and threat intelligence from our continued monitoring of exploitation activity by Storm-2603 leading to the deployment of Warlock ransomware. Based on new ...
Want smarter insights in your inbox? Sign up for our weekly newsletters to get only what matters to enterprise AI, data, and security leaders. Subscribe Now AnyCoder, an open-source web app ...