Ten malicious packages mimicking legitimate software projects in the npm registry download an information-stealing component ...
Recently, security researchers Socket found 10 packages on npm targeting software developers, specifically those who use the ...
Cybersecurity, Cyber Espionage, Malware, PlugX, Data Breach, Vulnerability, Phishing, European Union, Threat Intelligence ...
Hackers have turned the RedTiger toolkit into a data-stealing weapon. This post breaks down the threat and the steps to keep your PC safe.
The npm packages were available since July, have elaborately obfuscated malicious routines, and rely on a fake CAPTCHA to ...
Ten typosquatted npm packages (Jul 4, 2025) delivered a 24MB PyInstaller info stealer using 4 obfuscation layers; ~9,900 ...
An advanced malware campaign on the npm registry steals the very keys that control enterprise cloud infrastructure.
If you cannot download a file from the Internet or save or run it using Firefox, Chrome, Edge, Opera, or other browsers on Windows 11/10; that is, when you click a link to download a file, nothing ...
The typosquatted packages auto-execute on installation, fingerprint victims by IP, and deploy a PyInstaller binary to harvest ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results