PHANTOMPULSE spreads via Obsidian plugin abuse in REF6598 campaign, targeting finance and crypto users, bypassing AV controls ...
A new wave of device code phishing shows how threat actors are scaling account compromise using AI and end‑to‑end automation.
LinkedIn runs a hidden JavaScript script called Spectroscopy that silently probes over 6,000 Chrome extensions and collects ...
A massive campaign impacting nearly 100 online stores using the Magento e-commerce platform hides credit card-stealing code ...
Two CISOs dissect the Axios npm attack, revealing a self-erasing RAT, CI/CD compromise risks and why open-source software ...
Attackers stole a long-lived npm token from the lead axios maintainer and published two poisoned versions that drop a cross-platform RAT. Axios sits in 80% of cloud environments. Huntress confirmed ...
Automation that actually understands your homelab.
With almost 175,000 npm projects listing the library as a dependency, the attack had a huge cascade effect and shows how quickly a compromised package can propagate through the ecosystem.
Strapi plugins exploit Redis and PostgreSQL via postinstall scripts, enabling persistent access and data theft.
Retrieval-Augmented Generation (RAG) is critical for modern AI architecture, serving as an essential framework for building ...
University of California researchers have identified a new class crypto theft, stemming from AI agent routers - here's everything to know.