Threat actors are now abusing DNS queries as part of ClickFix social engineering attacks to deliver malware, making this the first known use of DNS as a channel in these campaigns.
What I really love about the self-hosting ecosystem is that there are apps for practically every use case – be it private NVRs for surveillance cameras, DNS sinkholes to block ads, or media servers ...
fluffy is a Flask-based web application that allows you to upload arbitrary files to the web. Once you upload the files, you get a link to the file which you can share. fluffy was created out of ...
Threat actors are abusing Pastebin comments to distribute a new ClickFix-style attack that tricks cryptocurrency users into executing malicious JavaScript in their browser, allowing attackers to ...
A online demo is available at pasteburn.onrender.com. Note that the demo is very unstable and should not be used for purposes other than demonstration. Paste something into pasteburn with a password.
Crypto Developers Targeted by Python Malware Disguised as Coding Challenges The North Korea-linked threat actor assessed to be behind the massive Bybit hack in February 2025 has been linked to a ...
An analysis of the indicators of compromise ( IoCs ) associated with the JumpCloud hack has uncovered evidence pointing to the involvement of North Korean state-sponsored groups, in a style that's ...