News
Popular JavaScript libraries eslint-config-prettier and eslint-plugin-prettier were hijacked this week and turned into ...
Recent attacks by the state-run cyberespionage group against Ukrainian government targets included malware capable of ...
Arch Linux has pulled three malicious packages uploaded to the Arch User Repository (AUR) were used to install the CHAOS remote access trojan (RAT) on Linux devices.
I recently bought a new Windows laptop and struggled to get the search bar in the Start menu working like it should.
GitHub is an extremely popular platform in the open source world, and as such is under a constant barrage of attacks. This ...
Researchers uncover stealth malware using DNS records to bypass detection tools and hijack systems through less monitored ...
The use of GitHub gave the malware-as-a-service (MaaS) a reliable and easy-to-use platform that’s greenlit in many enterprise ...
Malicious GitHub repositories used by threat actors to host Amadey payloads and steal data, impacting targeted entities.
A new malware distribution campaign leveraging public GitHub repositories as a delivery infrastructure for various malicious ...
However, a review of stolen password data gathered by multiple breach-tracking services shows that at the end of June 2025, a ...
Security expert Brian Krebs revealed Marko Elez, an employee at Elon Musk’s Department of Government Efficiency, had access ...
An open-source malware can now spawn into DCRat, Venom RAT, and JasonRAT, powering phishing, data theft, and MaaS campaigns worldwide.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results