VPNs, Virtual Private Networks, aren’t just a good idea to keep your data secure: for millions of people living under ...
Gannon Ken Van Dyke was part of the operation to capture Maduro in January and used his access to classified information to ...
Attackers published a malicious command-line version of the popular open-source password manager to the npm registry and may ...
The Bitwarden CLI was briefly compromised after attackers uploaded a malicious @bitwarden/cli package to npm containing a credential-stealing payload capable of spreading to other projects.
Recently observed Trigona ransomware attacks are using a custom, command-line tool to steal data from compromised ...
A relatively new ransomware family is using a novel approach to hype the strength of the encryption used to scramble ...
ESET Research has discovered a new China-aligned APT group that we’ve named GopherWhisper, which targets Mongolian ...
ESET Research has uncovered a new China-aligned APT group, which has been named GopherWhisper, that targets governmental institutions in Mongolia. GopherWhisper leverages Discord, Slack, Microsoft 365 ...
ESET Research has uncovered a new China-aligned APT group, which has been named GopherWhisper, that targets governmental institutions in Mongolia.GopherWhisper leverages Discord, Slack, Microsoft 365 ...
Google has unveiled a broad set of updates for its Google Workspace at Google Cloud Next 2026, with a strong focus on ...
A new Linux GoGra backdoor abuses Outlook via Microsoft Graph API for stealthy C2, targeting telecom, government, and IT sectors.
Google has introduced subagents in Gemini CLI, a new capability designed to help developers delegate complex or repetitive ...