Discover the types of malware in 2025, from backdoors to ransomware, and learn which families hackers use most in real-world attacks.
North Korean-linked crews connected to the pervasive IT worker scams have upped their malware game, using more advanced tools ...
Dustin Kirkland of Chainguard explains how verified, hardened components and AI-powered automation can prevent malware ...
North Korea’s Contagious Interview spreads AkdoorTea and TsunamiKit to steal crypto and infiltrate global developers.
ESET researchers reveal how malware operators collaborate with covert North Korean IT workers, posing a threat to both headhunters and job seekers.
Chainguard, a trusted foundation for software development and deployment, is launching Chainguard Libraries for JavaScript, a collection of trusted builds of thousands of common JavaScript ...
"Appearing to be aided by a large language model (LLM), the activity obfuscated its behavior within an SVG file, leveraging ...
ZachXBT documents North Korean IT workers infiltrating crypto companies in over 25 instances for hacks and extortion schemes.
A 21-year-old Patna college dropout, Ashwani Kumar, emerged as a central figure in India's movie piracy network. Using ...
When you’re working on multiple projects, it’s easy to end up with a disorganized collection of config documents, binaries, and executable files. If you’re not careful with the packages, you’re just ...
Chainguard Libraries for JavaScript include builds that are malware-resistant and built from source on SLSA L2 infrastructure ...
A gang of North Korean hackers behind fake IT job recruitment scams now have access to a remote access Trojan favored by ...