Cybersecurity, Cyber Espionage, Malware, PlugX, Data Breach, Vulnerability, Phishing, European Union, Threat Intelligence ...
The npm packages were available since July, have elaborately obfuscated malicious routines, and rely on a fake CAPTCHA to ...
Recently, security researchers Socket found 10 packages on npm targeting software developers, specifically those who use the ...
Ten malicious packages mimicking legitimate software projects in the npm registry download an information-stealing component ...
The typosquatted packages auto-execute on installation, fingerprint victims by IP, and deploy a PyInstaller binary to harvest ...
Attackers are using the open-source red-team tool RedTiger to build an infostealer that collects Discord account data and ...
Supply chain security company Safety has discovered a trojan in NPM that masqueraded as Anthropic’s popular Claude Code AI ...
Ten typosquatted npm packages (Jul 4, 2025) delivered a 24MB PyInstaller info stealer using 4 obfuscation layers; ~9,900 ...
The FIA has admitted that its driver categorisation platform was briefly compromised earlier this year when ethical hackers ...
A wave of advanced phishing campaigns is exploiting a novel combination of social engineering and browser-cache manipulation ...
A new type of malware called RedTiger has been popping up more and more in recent months. While the tool was originally ...
MIT Technology Review helps break down how this moment is changing science and technology—and how we can make it through.