Cybersecurity researchers have identified what is believed to be the earliest known instance of malware that leverages a Large Language…
The cybersecurity landscape has witnessed a dramatic evolution in attack methodologies, with fileless malware emerging as one of the most…
The first-ever malicious Model-Context-Prompt (MCP) server discovered in the wild, a trojanized npm package named postmark-mcp that has been secretly…
A sophisticated attack technique called LNK Stomping has emerged as a critical threat to Windows security, exploiting a fundamental flaw…
The Cybersecuritynews researcher team uncovered a sophisticated social engineering campaign that is exploiting the public's need for free internet access,…
A new, sophisticated malware campaign has been uncovered that leverages Microsoft's Azure Functions for its command-and-control (C2) infrastructure, a novel…
When every minute counts, it’s important to have access to fresh threat intelligence at the tip of your finger. That’s…
Researchers at Hunt.io have made a significant discovery in the cybersecurity field by obtaining and analyzing the complete source code…
A sophisticated Linux backdoor dubbed Plague has emerged as an unprecedented threat to enterprise security, evading detection across all major…
A sophisticated new variant of DCHSpy Android surveillanceware, deployed by the Iranian cyber espionage group MuddyWater just one week after…