A new trojan named TCLBanker, which targets 59 banking, fintech, and cryptocurrency platforms, uses a trojanized MSI ...
Hackers are exploiting a recent accidental source code leak from Anthropic to spread Vidar infostealer malware via fake GitHub repositories. These malicious sites have even managed to appear in top ...
Hackers exploit Claude Code leak with fake GitHub repos Malicious files deploy Vidar infostealer and GhostSocks proxy malware Anthropic faces rising scrutiny amid recent vulnerabilities and rapid ...
Anthropic accidentally exposed the source code for Claude Code via an npm package. The leak included around 513,000 lines of unobfuscated TypeScript code across 1,906 files. The exposed code quickly ...
In order to spread Vidar information-stealing malware, threat actors are taking advantage of the recent Claude Code source code breach by creating phony GitHub repositories. Threat actors are now ...
A newly uncovered malware campaign is combining ClickFix delivery with AI generated evasion techniques to steal enterprise user accounts and passwords. The attacks are designed to provide intruders ...
A large-scale malware campaign is targeting developers on GitHub, using fake Visual Studio Code security alerts to trick users into downloading malicious payloads and exposing system data. According ...
The MarketWatch News Department was not involved in the creation of this content. TYSONS, Va., March 23, 2026 (GLOBE NEWSWIRE) -- CodeHunter, the Zero Trust for Code security company, today announced ...
The newly observed malware abuses VS Code’s “runOn:folderOpen” feature to execute automatically from trusted projects, enabling near-frictionless compromise. A newly disclosed malware strain dubbed ...
Kaspersky has warned of a new malware campaign targeting developers through fake Claude Code and OpenClaw downloads. Using malicious search ads, hackers are infecting Windows and Mac users with ...
Google researchers have identified an iOS exploit chain called DarkSword that works against iPhones running iOS versions 18.4 through 18.7. The exploit can be used to deliver Ghostblade malware that ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results