News — Pixelift

Latest Stories

31 articles
DPRK-Linked Hackers Use GitHub as C2 in Multi-Stage Attacks Targeting South Korea
SecurityApr 6The Hacker News

DPRK-Linked Hackers Use GitHub as C2 in Multi-Stage Attacks Targeting South Korea

Hackers Are Posting the Claude Code Leak With Bonus Malware
IndustryApr 4

Hackers Are Posting the Claude Code Leak With Bonus Malware

CERT-UA Impersonation Campaign Spread AGEWHEEZE Malware to 1 Million Emails
SecurityApr 1

CERT-UA Impersonation Campaign Spread AGEWHEEZE Malware to 1 Million Emails

Microsoft Warns of WhatsApp-Delivered VBS Malware Hijacking Windows via UAC Bypass
SecurityApr 1

Microsoft Warns of WhatsApp-Delivered VBS Malware Hijacking Windows via UAC Bypass

Don't open that WhatsApp message, Microsoft warns
IndustryMar 31

Don't open that WhatsApp message, Microsoft warns

Popular AI gateway startup LiteLLM ditches controversial startup Delve
AIMar 30TechCrunch AI

Popular AI gateway startup LiteLLM ditches controversial startup Delve

DeepLoad Malware Uses ClickFix and WMI Persistence to Steal Browser Credentials
SecurityMar 30

DeepLoad Malware Uses ClickFix and WMI Persistence to Steal Browser Credentials

Russian CTRL Toolkit Delivered via Malicious LNK Files Hijacks RDP via FRP Tunnels
SecurityMar 30

Russian CTRL Toolkit Delivered via Malicious LNK Files Hijacks RDP via FRP Tunnels

TeamPCP Pushes Malicious Telnyx Versions to PyPI, Hides Stealer in WAV Files
SecurityMar 27

TeamPCP Pushes Malicious Telnyx Versions to PyPI, Hides Stealer in WAV Files

Open VSX Bug Let Malicious VS Code Extensions Bypass Pre-Publish Security Checks
SecurityMar 27

Open VSX Bug Let Malicious VS Code Extensions Bypass Pre-Publish Security Checks

China-Linked Red Menshen Uses Stealthy BPFDoor Implants to Spy via Telecom Networks
SecurityMar 26The Hacker News

China-Linked Red Menshen Uses Stealthy BPFDoor Implants to Spy via Telecom Networks

AI supply chain attacks don’t even require malware…just post poisoned documentation
IndustryMar 25

AI supply chain attacks don’t even require malware…just post poisoned documentation

GlassWorm Malware Uses Solana Dead Drops to Deliver RAT and Steal Browser, Crypto Data
SecurityMar 25

GlassWorm Malware Uses Solana Dead Drops to Deliver RAT and Steal Browser, Crypto Data

Tax Search Ads Deliver ScreenConnect Malware Using Huawei Driver to Disable EDR
SecurityMar 24

Tax Search Ads Deliver ScreenConnect Malware Using Huawei Driver to Disable EDR

North Korean Hackers Abuse VS Code Auto-Run Tasks to Deploy StoatWaffle Malware
SecurityMar 23

North Korean Hackers Abuse VS Code Auto-Run Tasks to Deploy StoatWaffle Malware

Microsoft Warns IRS Phishing Hits 29,000 Users, Deploys RMM Malware
SecurityMar 23The Hacker News

Microsoft Warns IRS Phishing Hits 29,000 Users, Deploys RMM Malware

Trivy Hack Spreads Infostealer via Docker, Triggers Worm and Kubernetes Wiper
SecurityMar 23

Trivy Hack Spreads Infostealer via Docker, Triggers Worm and Kubernetes Wiper

Google Adds 24-Hour Wait for Unverified App Sideloading to Reduce Malware and Scams
SecurityMar 20

Google Adds 24-Hour Wait for Unverified App Sideloading to Reduce Malware and Scams

Speagle Malware Hijacks Cobra DocGuard to Steal Data via Compromised Servers
SecurityMar 19

Speagle Malware Hijacks Cobra DocGuard to Steal Data via Compromised Servers

New Perseus Android Banking Malware Monitors Notes Apps to Extract Sensitive Data
SecurityMar 19

New Perseus Android Banking Malware Monitors Notes Apps to Extract Sensitive Data

Konni Deploys EndRAT Through Phishing, Uses KakaoTalk to Propagate Malware
SecurityMar 17The Hacker News

Konni Deploys EndRAT Through Phishing, Uses KakaoTalk to Propagate Malware

GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos
SecurityMar 16

GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos

Android 17 Blocks Non-Accessibility Apps from Accessibility API to Prevent Malware Abuse
SecurityMar 16

Android 17 Blocks Non-Accessibility Apps from Accessibility API to Prevent Malware Abuse

GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers
SecurityMar 14

GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers