Hackers are hijacking GitHub and Jira’s notification systems to send phishing emails that pass all security checks. Discover the mechanics of this new 'Platform-as-a-Proxy' attack and how organizations can defend against it.
Attackers are abusing the trust in GitHub and Jira notification emails to launch phishing attacks that evade standard security checks. Here’s how Platform-as-a-Proxy works and what defenders need to know.
Threat actors are weaponizing trusted platforms like GitHub and GitLab to deliver malware and launch sophisticated phishing campaigns. Discover how these attacks bypass traditional security and what it means for users and enterprises.
GitHub and GitLab, once synonymous with innovation, are now being exploited by hackers to deliver malware and launch phishing attacks. Discover how cybercriminals are turning trusted code repositories into powerful attack platforms.
A simple packaging error exposed Anthropic’s Claude Code, fueling a surge of Vidar and GhostSocks infections via fake GitHub AI tool downloads. Learn how this incident highlights both technical and governance risks in the age of agentic AI.
North Korean threat actors have turned GitHub—a trusted developer platform—into a covert control center for a multi-stage phishing campaign targeting South Korean companies. By disguising malicious LNK files as PDFs and blending their activity with legitimate encrypted traffic, the attackers evaded detection and demonstrated a new era of stealthy cyber espionage.
North Korean-linked hackers are leveraging Windows shortcuts and GitHub to launch a stealthy multi-stage malware campaign against South Korea, blending into normal traffic and evading traditional security measures.
North Korean cybercriminals are abusing GitHub as a covert command-and-control network in a new wave of phishing attacks targeting South Korea, using stealthy LNK files and native Windows tools to evade detection.
North Korean hackers have launched a stealthy phishing campaign targeting South Korea, using GitHub as a covert command and control center. By blending malicious scripts with legitimate cloud traffic, attackers evade detection and maintain persistent access to compromised systems.
A coordinated campaign is flooding GitHub with fake Visual Studio Code security alerts, luring developers into downloading malware through convincing advisories and trusted channels like Google Drive.