
npm registry attacked by secret-stealing worm
A new large-scale attack on a popular JavaScript code registry has hit around 150 packages. The automatic propagation of the threat makes it especially dangerous — developers need to react ASAP.
482 articles
A new large-scale attack on a popular JavaScript code registry has hit around 150 packages. The automatic propagation of the threat makes it especially dangerous — developers need to react ASAP.
Unknown attackers have compromised several popular npm packages in a supply-chain attack.
WordPress sites are increasingly becoming targets of attacks exploiting vulnerabilities in plugins and themes. In this post, we examine recent cases and share protection tips.
A popular developer tool has been trojanized and is uploading secrets to public GitHub repositories. We discuss what’s important to know for both developers and cybersecurity services.
How attackers can hijack your computer through its webcam — and how to stop it.
Attackers spin poignant tales of lost private keys as they try to phish seed phrases.
Google experts have demonstrated how complex hardware vulnerabilities in CPUs can be effectively exploited.
Researchers have devised a theoretical attack to steal private encryption keys through monitoring standard CPU and OS behavior.
Companies need to build a culture of security, but this is impossible when employees are afraid to discuss incidents or suggest improvements.
Using anomalies in the behavior of users, devices, applications, and other entities to detect cyberthreats.
Attackers are sending phishing emails to developers of PyPi packages and Firefox add-ons.
Causes of discrepancies in Common Vulnerability Scoring System ratings, common mistakes when using CVSS for vulnerability prioritization, and how to do this right.
Two critical zero-day vulnerabilities in SharePoint are actively exploited by attackers in real-world attacks.
How the research tool Defendnot disables Microsoft Defender by registering a fake antivirus, and why you shouldn’t always trust what your operating system says.
This is a story of how a blockchain developer lost US$500 000 to a fake Solidity extension from the Open VSX marketplace.
How cybercriminals can exploit your online store — and how to stop them.
Drawing from INTERPOL’s just-released Africa Cyberthreat Assessment Report, we identify which threats most often target developing businesses – and how to stop them.
Researchers have found several vulnerabilities in the Sitecore CMS platform that enable unauthenticated remote code execution (RCE).
Researchers have found a vulnerability that allows attackers to get root privileges on most Linux distributions.
Internet Explorer sends its regards: a vulnerability in the HTTP protocol extension allows attackers to run malicious code — even on a modern operating system.
Since 2016, a threat actor has been exploiting insecure plugins and themes to infect WordPress websites and redirect traffic to malicious websites.