Cybersecurity researchers have discovered 36 malicious packages in the npm registry that are disguised as Strapi CMS plugins but come with different...
Vous n'êtes pas connecté
Maroc - BLEEPINGCOMPUTER.COM - A La Une - 03/01/2025 15:53
Twenty malicious packages impersonating the Hardhat development environment used by Ethereum developers are targeting private keys and other sensitive data. [...]
Cybersecurity researchers have discovered 36 malicious packages in the npm registry that are disguised as Strapi CMS plugins but come with different...
Cybersecurity researchers have discovered 36 malicious packages in the npm registry that are disguised as Strapi CMS plugins but come with different...
Google links the Axios npm supply chain attack to North Korean threat group UNC1069, targeting financial gain. Google has attributed the recent Axios...
Attackers are escalating tactics across cloud and AI ecosystems, exploiting Kubernetes misconfigurations to pivot into cloud accounts and distributing...
Attackers are escalating tactics across cloud and AI ecosystems, exploiting Kubernetes misconfigurations to pivot into cloud accounts and distributing...
Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape Thirty-Six...
A widespread cyber espionage campaign leveraging 108 malicious Google Chrome extensions. According to a recent report by Socket, these extensions are...
A widespread cyber espionage campaign leveraging 108 malicious Google Chrome extensions. According to a recent report by Socket, these extensions are...
The GlassWorm campaign uses a Zig-based dropper hidden in a fake IDE extension to infect developer tools and compromise systems. The GlassWorm...
The GlassWorm campaign uses a Zig-based dropper hidden in a fake IDE extension to infect developer tools and compromise systems. The GlassWorm...