The North Korean APT Kimsuky uses malicious QR codes in spear-phishing attacks targeting academics, government entities, and ...
Researchers discovered malicious npm packages posing as n8n integrations, exfiltrating OAuth tokens and API keys from ...
North Korean hackers are turning one of the most mundane conveniences in modern life, the QR code, into a precision tool for ...
The FBI Jan. 8 released an alert on evolving threat tactics by Kimsuky, a North Korean state-sponsored cyber threat group. As of last year, the group has targeted research organizations, academic ...
So, when an attacker sends a fake UCPath payroll notification with a QR code linking to a credential harvesting site, a SEG ...
Browser extensions turned malicious after years of legitimate operation in DarkSpectre campaign affecting millions. The ...
Phishing attacks using malicious QR codes surged more than fivefold in the second half of 2025 as cybercriminals increasingly ...
Researchers from the Koi security company discovered an ongoing campaign spreading malicious wallet extensions on Firefox. The malicious apps spoof the most widely used wallets, stealing private ...
Hackers were reportedly able to modify several Chrome extensions with malicious code this month after gaining access to admin accounts through a phishing campaign. The cybersecurity company Cyberhaven ...
Thousands of active AWS accounts are vulnerable to a cloud image name confusion attack that could allow attackers to execute codes within those accounts. According to DataDog research, vulnerable ...
What security teams need to know about the browser-based attack techniques that are the leading cause of breaches in 2025. “The browser is the new battleground.” “The browser is the new endpoint”.