Researchers outline how the PhantomRaven campaign exploits hole in npm to enable software supply chain attacks.
The typosquatted packages auto-execute on installation, fingerprint victims by IP, and deploy a PyInstaller binary to harvest ...
For the past four months, over 130 malicious NPM packages deploying information stealers have been collectively downloaded ...
Attackers are exploiting a major weakness that has allowed them access to the NPM code repository with more than 100 credential-stealing packages since August, mostly without detection.
Recently, security researchers Socket found 10 packages on npm targeting software developers, specifically those who use the ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results