Plugins on WordPress.org backdoored in supply chain attack
A threat actor modified the source code of at least five plugins hosted on WordPress.org to include malicious PHP scripts that…
A threat actor modified the source code of at least five plugins hosted on WordPress.org to include malicious PHP scripts that…
Judeo-Christian culture has an intelligence problem. Not to put too fine a point on it, there’s a special propensity to…
A new malware distribution campaign uses fake Google Chrome, Word, and OneDrive errors to trick users into running malicious PowerShell…
Threat actors impersonate GitHub's security and recruitment teams in phishing attacks to hijack repositories using malicious OAuth apps in an…
Since at least February, a threat actor has been attempting to extort victims by stealing or wiping data in their…
Europol and German law enforcement have revealed the identities of eight cybercriminals linked to the various malware droppers and loaders…
By Guillermo Gomez, Vice President of Endpoint Product, WatchGuard Technologies For truly effective network security posture, it’s crucial to protect…
Two weeks before Russia invaded Ukraine in February 2022, a large, mysterious new Internet hosting firm called Stark Industries Solutions…
Cryptocurrency theft and financial fraud are the new M.O. of the 15-year-old malware operation that has hit organizations around the…
Apple's antifraud technology has blocked more than $7 billion in potentially fraudulent transactions in four years, the company states in its…