Attack

Flaws in Anthropic Git Server Allow Code Execution
Malware & Threats Flaws in Anthropic Git Server Allow Code Execution

The integration of large language models with development tools has unlocked unprecedented productivity, yet this new frontier of AI-assisted coding introduces complex security challenges that can be exploited in non-traditional ways. A recently disclosed set of three critical security

Will Human Trust Survive AI-Driven Cyberattacks?
Malware & Threats Will Human Trust Survive AI-Driven Cyberattacks?

A single, perfectly timed video call from a chief executive officer, visually and audibly indistinguishable from the real person, has just authorized a multimillion-dollar transfer that will cripple a company before the actual executive even finishes their morning coffee. This is not a speculative

Malicious Extension Crashes Browsers to Install New RAT
Malware & Threats Malicious Extension Crashes Browsers to Install New RAT

The mundane frustration of a crashing web browser might be more than just a technical glitch; for thousands of users, it has become the gateway to a sophisticated cyberattack designed to seize control of their systems. A malicious Google Chrome extension, downloaded over 5,000 times from the

Is VoidLink a New Class of Linux Cloud Malware?
Security Operations & Management Is VoidLink a New Class of Linux Cloud Malware?

Today we’re speaking with Rupert Marais, our in-house security specialist, to unpack a deeply concerning development in the world of cybersecurity. A newly discovered malware framework, dubbed VoidLink, is poised to change how we think about threats to Linux systems. Far from a simple script, this

What Makes the New Fog Ransomware So Dangerous?
Malware & Threats What Makes the New Fog Ransomware So Dangerous?

A highly focused and financially motivated ransomware campaign has been systematically targeting organizations across the United States, demonstrating a rapid and destructive operational model that prioritizes speed over subtlety. First identified in early May 2024, the threat, known as Fog

Fake WinRAR Sites Deliver Sophisticated Winzipper Trojan
Malware & Threats Fake WinRAR Sites Deliver Sophisticated Winzipper Trojan

The immense popularity of everyday software utilities creates a landscape of trust that cybercriminals are increasingly adept at exploiting through highly convincing fraudulent websites and sophisticated malware. A newly uncovered campaign is leveraging the trusted name of the WinRAR file archiver

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later