Huntress finds three GootLoader infections since Oct 27, 2025; two led to domain controller compromise within 17 hours.
"The threat actors have recently resorted to utilizing JSON storage services like JSON Keeper, JSONsilo, and npoint.io to ...
The Register on MSN
Gootloader malware back for the attack, serves up ransomware
Move fast - miscreants compromised a domain controller in 17 hours Gootloader JavaScript malware, commonly used to deliver ...
The npm packages were available since July, have elaborately obfuscated malicious routines, and rely on a fake CAPTCHA to appear authentic.
Add a description, image, and links to the javascript-obfuscator-library topic page so that developers can more easily learn about it.
Add a description, image, and links to the javascript-obfuscator-tool topic page so that developers can more easily learn about it.
The typosquatted “@acitons/artifact” package targeted GitHub’s CI/CD workflows, stealing tokens and publishing malicious ...
The economics of cybercrime have shifted dramatically. What once took skilled attackers weeks to reverse engineer can now be accomplished in hours using AI-powered analysis tools and automated systems ...
The Gootloader malware scam, which was thought to have been disrupted and shut down in March 2025, has returned with both old ...
The GlassWorm malware campaign, which impacted the OpenVSX and Visual Studio Code marketplaces last month, has returned with ...
Over the last month, Barracuda threat analysts have seen the following notable developments in email-based threats targeting ...
Google has seen several new and interesting ways in which malware has been leveraging artificial intelligence.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results