CRESCENTHARVEST uses protest lures and malicious LNK files to deploy RAT malware targeting Iran protest supporters for ...
Critical vulnerabilities in four widely used VS Code extensions could enable file theft and remote code execution across 125M installs.
A multi-stage malware loader known as OysterLoader has continued to evolve into early 2026, refining its command-and-control (C2) infrastructure and obfuscation methods.
Threat actors are sending physical letters pretending to be from Trezor and Ledger, makers of cryptocurrency hardware wallets ...
Self-hosted agents execute code with durable credentials and process untrusted input. This creates dual supply chain risk, ...