Source Link Given the rise in malicious packages flooding the open-source environment, a new…
malicious
-
-
Source Link A threat actor dubbed “RED-LILI” has been linked to an ongoing large-scale…
-
Network SecuritySecurity
Using Windows Defender Application Control to block malicious applications and drivers
Source Link Ideally, we would lock down our operating systems to allow only those…
-
Malware
Cybercriminals hit malware authors with malicious NPM packages
by Deeba Ahmedby Deeba AhmedSource Link Discord tokens have become the perfect medium for cybercriminals to gain unauthorized…
-
Source Link Another batch of 25 malicious JavaScript libraries have made their way to…
-
Source Link Cisco has released security updates to contain three vulnerabilities affecting its products,…
-
Source Link A security researcher has discovered an odd malware campaign flooding Twitter. The…
-
Malware
Google Drive accounted for 50% of malicious Office document downloads
by Deeba Ahmedby Deeba AhmedSource Link OneDrive was responsible for 19% while 15% of malicious Microsoft Office documents…
-
The FBI has issued an alert urging users to refrain from scanning anonymous QR…
-
Potential connections between a subscription-based crimeware-as-a-service (Caas) solution and a cracked copy of Cobalt…