A newly-discovered malicious package with layers of obfuscation is disguised as a utility library, with malware essentially ...
GitHub enforces FIDO 2FA and seven-day token limits after Shai-Hulud npm attack to boost supply chain security.
A cybercrime crew using Android mobile apps to conduct advertising fraud took unusual pains to hide its activity, concealing ...
A malicious npm package named Fezbox has been found using an unusual technique to conceal harmful code. The package employs a ...
We’ve all heard of Gen AI being used to craft bodies of convincing phishing emails, however Microsoft researchers have now discovered a campaign in which threat actors took AI use in phishing a step ...
ESET researchers reveal how malware operators collaborate with covert North Korean IT workers, posing a threat to both headhunters and job seekers.
Newly discovered npm package 'fezbox' employs QR codes to hide a second-stage payload to steal cookies from a user's web browser. The package, masquerading as a utility library, leverages this ...
North Korea’s Contagious Interview spreads AkdoorTea and TsunamiKit to steal crypto and infiltrate global developers.
A massive phishing campaign targeted GitHub users with cryptocurrency drainers, delivered via fake invitations to the Y ...
The end of the decade-long nuclear deal originally agreed by Iran, Britain, Germany, France, the United States, Russia and ...
An infostealer particularly focused on stealing cryptocurrency wallet data from macOS, Windows and Linux users has been ...
North Korean hackers are intensifying their global campaign against cryptocurrency and Web3 developers, using a new backdoor ...