Hackers have injected credential-stealing malware into newly published versions of node-ipc, a popular inter-process communication package, in a new supply chain attack targeting npm. The node-ipc ...
Microsoft Threat Intelligence said attackers placed malicious code inside a Mistral AI download distributed through a Python ...
A new version of the CloudZ remote access tool (RAT) is deploying a previously unseen malicious plugin called Pheno that ...
Now, this isn't your average, run-of-the-mill villain. It's a wolf in sheep's clothing, acting all friendly while secretly plotting to steal your precious data. The malware goes by the name of ...
PCPJack makes innovative use of parquet files for stealthy, pre-validated target discovery as it canvasses multiple cloud ...
A new Android malware strain can reinstall itself even after deletion, using system permissions and backup mechanisms. Here’s how it works and the steps users can take to remove it completely.
NITDA issues a security alert for DeepLoad, a new AI malware targeting Nigerian institutions to steal sensitive data. Learn ...
ZiChatBot malware spread via 3 PyPI packages in July 2025 uses Zulip APIs as C2, enabling stealthy attacks across systems ...
A new Android malware exploits Accessibility Services to control devices, intercept OTPs, and block removal. Users should watch for unusual behaviour and follow safe mode and settings-based steps to ...
Discover Avast’s free version. Get full details on its key features, how it protects your device, how to safely install it, ...
Android Intrusion Logging stores encrypted forensic logs for 12 months, helping experts investigate spyware attacks on ...