Ten malicious packages mimicking legitimate software projects in the npm registry download an information-stealing component ...
Recently, security researchers Socket found 10 packages on npm targeting software developers, specifically those who use the ...
The npm packages were available since July, have elaborately obfuscated malicious routines, and rely on a fake CAPTCHA to ...
EtherHiding’: Nation-state and cybercriminal groups are leveraging smart contracts as command-and-control servers for ...
Researchers at tech giant Google's Threat Intelligence team highlight a years-old exploit that is now being used by North ...
North Korean hackers are now using a blockchain-based method known as EtherHiding to deliver malware to facilitate their ...
The typosquatted packages auto-execute on installation, fingerprint victims by IP, and deploy a PyInstaller binary to harvest ...
There isn’t a consistent threat model for extension marketplaces yet, McCarthy said, making it difficult for any platform to anticipate these risks. However, he added, Microsoft’s marketplace has seen ...
An advanced malware campaign on the npm registry steals the very keys that control enterprise cloud infrastructure.
Once you jailbreak your Kindle, it opens up new possibilities that were previously restricted by Amazon's software ...
The UK's Information Commissioner's Office (ICO) has issued a £14 million ($18.6 million) penalty to outsourcing giant Capita following a catastrophic 2023 cyberattack that exposed the personal data ...