A compromised Chrome extension with 7,000 users was updated to deploy malware, strip security headers, and steal cryptocurrency wallet seed phrases.
Security researchers say exploits used by governments to hack into iPhones have been found to be used by cybercriminals. They ...
A highly sophisticated set of iPhone hijacking techniques has likely infected tens of thousands of phones or more. Clues suggest it was originally built for the US government.
A 22-year-old Alabama man pleaded guilty to extortion, cyberstalking, and computer fraud charges after hijacking the social media accounts of hundreds of young women (including minors).
A Chrome vulnerability allowed malicious extensions to hijack the browser’s Gemini Live assistant to spy on users and ...
North Korean-linked campaign publishes 26 malicious npm packages hiding C2 in Pastebin, deploying credential stealers & RAT ...
Security researchers have disclosed a high-severity vulnerability dubbed "ClawJacked" in the popular AI agent OpenClaw that allowed a malicious website to silently bruteforce access to a locally ...
A threat actor has weaponized Anthropic’s Claude Code to breach the Mexican government’s systems and steal over 150GB of data ...
What makes this campaign so striking is not just the malware, but where it is being stored. By shifting malicious code into ...
While the Windows maker did not attribute the activity to a specific threat actor, the use of VS Code tasks and Vercel ...
A hacker exploited Anthropic PBC’s artificial intelligence chatbot to carry out a series of attacks against Mexican ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results