X

Vous n'êtes pas connecté

Maroc Maroc - BLEEPINGCOMPUTER.COM - A La Une - 03/01/2025 15:53

Malicious npm packages target Ethereum developers' private keys

Twenty malicious packages impersonating the Hardhat development environment used by Ethereum developers are targeting private keys and other sensitive data. [...]

Articles similaires

Sorry! Image not available at this time

36 Malicious npm Packages Exploited Redis, PostgreSQL to Deploy Persistent Implants

itsecuritynews.info - 05/Apr 06:07

Cybersecurity researchers have discovered 36 malicious packages in the npm registry that are disguised as Strapi CMS plugins but come with different...

Sorry! Image not available at this time

36 Malicious npm Packages Exploited Redis, PostgreSQL to Deploy Persistent Implants

itsecuritynews.info - 05/Apr 06:07

Cybersecurity researchers have discovered 36 malicious packages in the npm registry that are disguised as Strapi CMS plugins but come with different...

Sorry! Image not available at this time

Google links Axios npm supply chain attack to North Korea-linked APT UNC1069

securityaffairs.co - 01/Apr 13:47

Google links the Axios npm supply chain attack to North Korean threat group UNC1069, targeting financial gain. Google has attributed the recent Axios...

Sorry! Image not available at this time

Cyber Briefing: 2026.04.09

itsecuritynews.info - 09/Apr 14:32

Attackers are escalating tactics across cloud and AI ecosystems, exploiting Kubernetes misconfigurations to pivot into cloud accounts and distributing...

Sorry! Image not available at this time

Cyber Briefing: 2026.04.09

itsecuritynews.info - 09/Apr 14:32

Attackers are escalating tactics across cloud and AI ecosystems, exploiting Kubernetes misconfigurations to pivot into cloud accounts and distributing...

Sorry! Image not available at this time

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 92

securityaffairs.co - 12/Apr 12:23

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape Thirty-Six...

Sorry! Image not available at this time

Hackers Use 108 Chrome Extensions to Steal User Data Through Shared C2 Infrastructure

itsecuritynews.info - 14/Apr 11:14

A widespread cyber espionage campaign leveraging 108 malicious Google Chrome extensions. According to a recent report by Socket, these extensions are...

Sorry! Image not available at this time

Hackers Use 108 Chrome Extensions to Steal User Data Through Shared C2 Infrastructure

itsecuritynews.info - 14/Apr 11:14

A widespread cyber espionage campaign leveraging 108 malicious Google Chrome extensions. According to a recent report by Socket, these extensions are...

Sorry! Image not available at this time

GlassWorm evolves with Zig dropper to infect multiple developer tools

itsecuritynews.info - 11/Apr 17:04

The GlassWorm campaign uses a Zig-based dropper hidden in a fake IDE extension to infect developer tools and compromise systems. The GlassWorm...

Sorry! Image not available at this time

GlassWorm evolves with Zig dropper to infect multiple developer tools

itsecuritynews.info - 11/Apr 17:04

The GlassWorm campaign uses a Zig-based dropper hidden in a fake IDE extension to infect developer tools and compromise systems. The GlassWorm...