A supply-chain attack backdoored versions of Axios, a popular JavaScript library that's present in many different software ...
Threat actors are evading phishing detection in campaigns targeting Microsoft accounts by abusing the no-code app-building ...
The malware, known as Phantom Stealer, collects browser credentials, cookies, saved passwords, autofill data and payment card ...
The Tycoon 2FA phishing platform’s operations have been largely unaffected by the recent law enforcement takedown attempt.
Fake CAPTCHA pages can install the StealC infostealer. Don't paste or run commands; disconnect and change passwords.
Cookie-gated PHP web shells enable persistent Linux RCE via cron-based re-creation, reducing detection in routine traffic ...
Cookie-gated PHP webshells use obfuscation, php-fpm execution, and cron-based persistence to evade detection in Linux hosting ...
LinkedIn runs a hidden JavaScript script called Spectroscopy that silently probes over 6,000 Chrome extensions and collects ...
This new Storm attack platform can exfiltrate passwords and session data, enabling 2FA bypass. Google Chrome, Microsoft Edge ...
New Report Highlights Surge in Exposed API Keys, Session Tokens, and Machine Identities, and more. SpyCloud, the leader in identity threat protection, today released its annual 2026 Identity Exposure ...
ThreatsDay Bulletin covers stealthy attack trends, evolving phishing tactics, supply chain risks, and how familiar tools are ...