GlassWorm is evolving. Security researchers say the malware, which infiltrates code repositories with malicious extensions, can now deploy a RAT, is targeting MCP servers, and has a new way of moving ...
Interlock exploits CVE-2026-20131 zero-day since Jan 26, enabling root access on Cisco FMC, increasing ransomware risks.
OX Security reported a phishing campaign targeting developers using OpenClaw's name to lure victims into a fake site for ...
The GlassWorm supply-chain campaign has returned with a new, coordinated attack that targeted hundreds of packages, ...
GlassWorm campaign injects malware into GitHub Python repos using stolen tokens since March 8, 2026, exposing developers to ...
ThreatDown Uncovers First Cyber Attack Abusing Deno JavaScript Runtime for Fileless Malware Delivery
ThreatDown, the corporate business unit of Malwarebytes, today published research documenting what researchers believe to be the first documented case of attackers abusing the Deno JavaScript runtime ...
Developers adept at multiple coding languages are tricked into installing a familiar-sounding package from within the Node Package Manager registry instead of the original source. Hackers are abusing ...
A threat actor tracked as "Venom Spider" is targeting HR staff like recruiters with a complex phishing scheme that capitalizes on the need for such staff to open email attachments. Researchers at ...
Abstract: Obfuscation has become a popular technique used by attackers to hide malicious code in JavaScript applications. The detection of obfuscated code in JavaScript is a challenging task. A survey ...
Malicious JavaScript code delivered by the AppsFlyer Web SDK hijacked cryptocurrency, potentially in a supply-chain attack.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results