10 Malicious Code Packages Slither into PyPI Registry
The discovery adds to the growing list of recent incidents where threat actors have used public code repositories to distribute…
The discovery adds to the growing list of recent incidents where threat actors have used public code repositories to distribute…
Researchers have observed a new post-exploitation attack framework used in the wild, named Manjusaka, which can be deployed as an…
Dark Reading's digest of other "don't-miss" stories of the week — including a Microsoft alert connecting disparate cybercrime activity together,…
Security analysts have observed an affiliate of the LockBit 3.0 ransomware operation abusing a Windows Defender command line tool to…
Security analysts have observed an affiliate of the LockBit 3.0 ransomware operation abusing a Windows Defender command line tool to…
The operators of the QBot malware have been using the Windows Calculator to side-load the malicious payload on infected computers.…
Dark Reading's weekly roundup of all the OTHER important stories of the week.
A hardcoded password associated with the Questions for Confluence app has been publicly released, which will likely lead to exploit…
The Knauf Group has announced it has been the target of a cyberattack that has disrupted its business operations, forcing…
Hackers are impersonating well-known cybersecurity companies, such as CrowdStrike, in callback phishing emails to gain initial access to corporate networks.…