Cybersecurity, Cyber Espionage, Malware, PlugX, Data Breach, Vulnerability, Phishing, European Union, Threat Intelligence ...
The npm packages were available since July, have elaborately obfuscated malicious routines, and rely on a fake CAPTCHA to ...
Recently, security researchers Socket found 10 packages on npm targeting software developers, specifically those who use the ...
Cybersecurity researchers at Google’s Threat Intelligence Group (GTIG) have uncovered a sophisticated hacking campaign by a North Korean state-linked group ...
Ten malicious packages mimicking legitimate software projects in the npm registry download an information-stealing component ...
Attackers are using the open-source red-team tool RedTiger to build an infostealer that collects Discord account data and ...
North Korean threat group Famous Chollima is using blockchain technology to hide malware payloads in smart contracts, which marks the first documented case of a nation-state actor adopting ...
North Korean hackers expand cyber campaigns using blockchain-based malware to steal cryptocurrency and evade detection, researchers report.
ClickFix, FileFix, fake CAPTCHA — whatever you call it, attacks where users interact with malicious scripts in their web browser are a fast-growing source of security breaches. ClickFix attacks prompt ...
SquareX has demonstrated how malicious browser extensions can impersonate AI sidebar interfaces for phishing and other ...
Researchers at tech giant Google's Threat Intelligence team highlight a years-old exploit that is now being used by North Korean state-sanctioned hackers.
The typosquatted packages auto-execute on installation, fingerprint victims by IP, and deploy a PyInstaller binary to harvest ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results