GoKawiil
Tech News
clear
Topic Analysis:
Today
This Week
This Month
This Year
31.
Ransomware IAB abuses EDR for stealthy malware execution
(bleepingcomputer.com)
2025-12-09 |
related products
| tags:
malicious
,
reliaquest
,
researchers
32.
Microsoft "mitigates" Windows LNK flaw exploited as zero-day
(bleepingcomputer.com)
2025-12-03 |
related products
| tags:
files
,
lnk files
,
malicious
33.
While ECH Adoption Is Low, Risks Remain for Enterprises, End Users
(darkreading.com)
2025-12-02 |
related products
| tags:
actors
,
actors internet
,
helping
34.
SmartTube YouTube App For Android TV Breached To Push Malicious Update
(slashdot.org)
2025-12-02 |
related products
| tags:
android
,
compromised
,
developer
35.
ShadyPanda browser extensions amass 4.3M installs in malicious campaign
(bleepingcomputer.com)
2025-12-01 |
related products
| tags:
edge
,
extension
,
extensions
36.
GreyNoise launches free scanner to check if you're part of a botnet
(bleepingcomputer.com)
2025-11-27 |
related products
| tags:
activity
,
devices
,
greynoise
37.
Google exposes BadAudio malware used in APT24 espionage campaigns
(bleepingcomputer.com)
2025-11-20 |
related products
| tags:
badaudio
,
google
,
gtig
38.
GlobalProtect VPN portals probed with 2.3 million scan sessions
(bleepingcomputer.com)
2025-11-20 |
related products
| tags:
activity
,
alto
,
alto networks
39.
W3 Total Cache WordPress plugin vulnerable to PHP command injection
(bleepingcomputer.com)
2025-11-19 |
related products
| tags:
cache
,
exploit
,
malicious
40.
AI's scary new trick: Conducting cyberattacks instead of just helping out
(zdnet.com)
2025-11-18 | by Charlie Osborne |
related products
| tags:
anthropic
,
attack
,
claude
41.
Cursor Issue Paves Way for Credential-Stealing Attacks
(darkreading.com)
2025-11-17 |
related products
| tags:
ai powered
,
allows
,
allows malicious
42.
150,000 Packages Flood NPM Registry in Token Farming Campaign
(darkreading.com)
2025-11-14 |
related products
| tags:
attack
,
attack led
,
led tidal
43.
AI doesn't just assist cyberattacks anymore - now it can carry them out
(zdnet.com)
2025-11-14 | by Charlie Osborne |
related products
| tags:
anthropic
,
attack
,
claude
44.
Google says group behind E-ZPass, USPS text scam has been 'shut down' after suit
(cnbc.com)
2025-11-13 | by Jaures Yip |
related products
| tags:
germany
,
google
,
group
45.
Commercial spyware “Landfall” ran rampant on Samsung phones for almost a year
(arstechnica.com)
2025-11-07 |
related products
| tags:
attack
,
files
,
image
46.
Malicious NuGet packages drop disruptive 'time bombs'
(bleepingcomputer.com)
2025-11-07 |
related products
| tags:
code
,
malicious
,
operations
47.
Supply chain attacks are exploiting our assumptions
(news.ycombinator.com)
2025-11-06 |
related products
| tags:
attackers
,
code
,
compromised
48.
Google spots malware in the wild that morphs mid-attack, thanks to AI
(zdnet.com)
2025-11-06 | by Charlie Osborne |
related products
| tags:
code
,
generate
,
google
49.
Gootloader malware is back with new tricks after 7-month break
(bleepingcomputer.com)
2025-11-05 |
related products
| tags:
archive
,
gootloader
,
malicious
50.
The Top 3 Browser Sandbox Threats That Slip Past Modern Security Tools
(bleepingcomputer.com)
2025-11-04 |
related products
| tags:
aware
,
browser
,
browsers
51.
Fake Solidity VSCode extension on Open VSX backdoors developers
(bleepingcomputer.com)
2025-11-03 |
related products
| tags:
command
,
ethereum
,
malicious
52.
Open VSX rotates access tokens used in supply-chain malware attack
(bleepingcomputer.com)
2025-11-03 |
related products
| tags:
extensions
,
malicious
,
open
53.
The security paradox of local LLMs
(news.ycombinator.com)
2025-10-31 | by Jacek Migdal |
related products
| tags:
code
,
local
,
malicious
54.
CISA: High-severity Windows SMB flaw now exploited in attacks
(bleepingcomputer.com)
2025-10-31 |
related products
| tags:
2025
,
cisa
,
malicious
55.
Malicious crypto-stealing VSCode extensions resurface on OpenVSX
(bleepingcomputer.com)
2025-10-31 |
related products
| tags:
koi
,
malicious
,
security
56.
A New Attack Lets Hackers Steal 2-Factor Authentication Codes From Android Phones
(wired.com)
2025-10-31 | by Dan Goodin |
related products
| tags:
app
,
attack
,
gpu
57.
Hackers can steal 2FA codes and private messages from Android phones
(arstechnica.com)
2025-10-31 |
related products
| tags:
android
,
app
,
attack
58.
Researchers find just 250 malicious documents can leave LLMs vulnerable to backdoors
(engadget.com)
2025-10-31 |
related products
| tags:
data
,
llm
,
malicious
59.
Malicious Rust packages on Crates.io steal crypto wallet keys
(bleepingcomputer.com)
2025-10-31 |
related products
| tags:
crate
,
crates
,
malicious
60.
NPM package caught using QR Code to fetch cookie-stealing malware
(bleepingcomputer.com)
2025-10-31 |
related products
| tags:
code
,
codes
,
malicious
‹ prev
1
2
3
4
next ›
Today's top topics:
linux
global
billion
center
google
stt gdc
affect
does affect
independent reviews
reviews
View all today's topics →