Researchers at Google Threat Intelligence Group (GTIG) say that a zero-day exploit targeting a popular open-source web ...
The professionalization of phishing demands a shift in defensive strategy. Signature-based detection that looks for known ...
The CloudZ Trojan steals data through Microsoft Phone Link. The campaign has been active since at least January 2026. Follow ...
Hackers are using Google Ads and Claude shared chats to target Mac users with fake setup instructions that can install ...
Google Threat Intelligence Group details how cybercriminals attempted to launch a campaign based around an AI-developed ...
The 2FA bypass exploit stemmed from a faulty trust assumption, providing evidence of AI reasoning that can discover ...
Fake IT workers are using AI to fabricate resumes, defeat interviews, and secure remote access to corporate systems. It will ...
GitHub facades and Ethereum smart contracts power a March 2026 admin-targeted campaign, enabling resilient C2 rotation and ...
MuddyWater used Teams phishing in 2026 to steal credentials, enabling stealthy data exfiltration and persistence without ...
Several npm packages for SAP's cloud application development ecosystem have been compromised as TeamPCP's supply chain ...
The wave of supply chain attacks aimed at security and developer tools has washed up more victims, namely SAP and Intercom ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results