The Contagious Interview campaign weaponizes job recruitment to target developers. Threat actors pose as recruiters from crypto and AI companies and deliver backdoors such as OtterCookie and ...
IntroductionOn March 1, 2026, ThreatLabz observed new activity from a China-nexus threat actor targeting countries in the Persian Gulf region. The activity took place within the first 24 hours of the ...
A vulnerability in some MediaTek-powered phones could allow attackers to extract encrypted data, including wallet seed phrases, using only a USB connection.
Despite widespread industry recommendations, a new ETH Zurich paper concludes that AGENTS.md files may often hinder AI coding agents. The researchers recommend omitting LLM-generated context files ...
The FBI is asking gamers who installed Steam titles containing malware to provide information as part of an ongoing ...
Amazon has just changed the encryption used for Kindle books on older e-readers without a software update. Any Kindle with ...
Smarter document extraction starts here.