A new report out today from cybersecurity company Forcepoint LLC’s X-Labs research team details a supply chain attack that ...
Attackers are increasingly abusing Microsoft’s legacy MSHTA utility to silently deliver malware, stealers, and persistent ...
A research team at Mohamed bin Zayed University of Artificial Intelligence published a finding in April 2026 that has gained traction in engineering circles for reasons that go beyond its headline ...
A legacy Windows scripting utility tied to Internet Explorer is still being used in modern malware campaigns, researchers say ...
The tool is available for macOS, Linux, and Windows. It can be installed through a one-line shell command that automates ...
Vercel Labs released Zero on May 15, 2026 — a low-level systems programming language whose compiler was built from the ground ...
I started this as a side project, but my Windows Command Center suddenly became useful.
The hacker group TeamPCP uploaded two malicious versions of the popular Python library LiteLLM to PyPI. Using a previously compromised version of the vulnerability scanner Trivy, the attackers stole ...
In recent weeks, alarm bells have been ringing repeatedly over critical vulnerabilities in the Linux kernel. Why is that? Do we have AI to thank for these discoveries? And should we expect similar ...
Hulud payload to steal CI/CD secrets from Linux-based automation environments. The malware executes during npm install and ...
Fox Tempest is a financially motivated threat actor operating a malware‑signing‑as‑a‑service (MSaaS) used by other ...