Experts exploited an XSS flaw in StealC’s admin panel, exposing operator sessions, system details & stolen cookies without ...
Security researchers LayerX have discovered 17 extensions for Chrome, Firefox, and Edge browsers which monitored people’s internet activity and installed backdoors for persistent access. In total, the ...
Discover how crypto malware operates through cryptojacking and ransomware, with real-world examples such as WannaMine and PowerGhost ...
Cybersecurity firm Group-IB found the DeadLock ransomware is exploiting Polygon smart contracts to create a resilient ...
Developers now need to be careful with job offers. Criminals are trying to distribute infostealers through them.
Backed by DST Global, Aikido Security’s $60 million Series B will fund global expansion and boost its AI-powered security ...
DeadLock, a ransomware group that first emerged in July 2025, has made news again, and this time it is for abusing Polygon ...
A dramatic spike in npm-focused intrusions shows how attackers have shifted from opportunistic typosquatting to systematic, credential-driven supply chain compromises — exploiting CI systems, ...
CrowdStrike plans to integrate Seraphic’s technology with its flagship Falcon cybersecurity platform. The development effort ...
Group-IB researchers said the most unusual aspect of DeadLock lies in its use of Polygon smart contracts to manage ...
GootLoader malware is abusing malformed ZIP archives that bypass common tools like WinRAR & deliver JavaScript payloads via ...