X

Vous n'êtes pas connecté

Maroc Maroc - BLEEPINGCOMPUTER.COM - A La Une - 03/Jan 15:53

Malicious npm packages target Ethereum developers' private keys

Twenty malicious packages impersonating the Hardhat development environment used by Ethereum developers are targeting private keys and other sensitive data. [...]

Articles similaires

Sorry! Image not available at this time

175 npm Packages Abused in Beamglea Phishing Operation

itsecuritynews.info - 10/Oct 21:02

The Beamglea campaign used 175 malicious npm packages to host phishing redirects, targeting global tech and energy firms. The post 175 npm Packages...

Sorry! Image not available at this time

NPM Infrastructure Abused in Phishing Campaign Aimed at Industrial and Electronics Firms

itsecuritynews.info - 13/Oct 12:02

Threat actors used automation to create over 175 malicious NPM packages targeting more than 135 organizations. The post NPM Infrastructure Abused in...

Sorry! Image not available at this time

NPM Infrastructure Abused in Phishing Campaign Aimed at Industrial and Electronics Firms

itsecuritynews.info - 13/Oct 12:02

Threat actors used automation to create over 175 malicious NPM packages targeting more than 135 organizations. The post NPM Infrastructure Abused in...

Sorry! Image not available at this time

175 Malicious npm Packages Targeting Tech and Energy Firms, 26,000 Downloads

itsecuritynews.info - 10/Oct 12:02

Socket’s Threat Research Team has uncovered a sprawling phishing campaign—dubbed “Beamglea”—leveraging 175 malicious npm packages that have...

Sorry! Image not available at this time

North Korean Hackers Attacking Developers with 338 Malicious npm Packages

itsecuritynews.info - 13/Oct 18:02

North Korean state-sponsored threat actors have intensified their supply chain attacks against software developers through a sophisticated campaign...

Sorry! Image not available at this time

North Korean Hackers Attacking Developers with 338 Malicious npm Packages

itsecuritynews.info - 13/Oct 18:02

North Korean state-sponsored threat actors have intensified their supply chain attacks against software developers through a sophisticated campaign...

Sorry! Image not available at this time

175 Malicious npm Packages with 26,000 Downloads Used in Credential Phishing Campaign

itsecuritynews.info - 10/Oct 11:32

Cybersecurity researchers have flagged a new set of 175 malicious packages on the npm registry that have been used to facilitate credential harvesting...

Sorry! Image not available at this time

Threat Actors Exploit Discord Webhooks for C2 via npm, PyPI, and Ruby Packages

itsecuritynews.info - 12/Oct 16:02

Threat actors are increasingly abusing Discord webhooks as covert command-and-control (C2) channels inside open-source packages, enabling stealthy...

Sorry! Image not available at this time

Threat Actors Exploit Discord Webhooks for C2 via npm, PyPI, and Ruby Packages

itsecuritynews.info - 12/Oct 16:02

Threat actors are increasingly abusing Discord webhooks as covert command-and-control (C2) channels inside open-source packages, enabling stealthy...

Sorry! Image not available at this time

Microsoft Defender Vulnerabilities Allow Attackers to Bypass Authentication and Upload Malicious Files

itsecuritynews.info - 11/Oct 17:32

Critical flaws uncovered in the network communication between Microsoft Defender for Endpoint (DFE) and its cloud services, allowing post-breach...