A malware campaign dubbed "OBSCURE#BAT" is making effective use of heavily obfuscated code and evasion techniques like API hooking to trick unsuspecting users into downloading an advanced and highly ...
A developer-targeting campaign leveraged malicious Next.js repositories to trigger a covert RCE-to-C2 chain through standard ...
Newly discovered npm package 'fezbox' employs QR codes to retrieve cookie-stealing malware from the threat actor's server. The package, masquerading as a utility library, leverages this innovative ...
Google’s Threat Intelligence Group reports that new malware strains use LLMs mid-execution to generate, rewrite, and obfuscate malicious code in real time. Threat actors are now actively deploying ...