
npm registry attacked by secret-stealing worm
A new large-scale attack on a popular JavaScript code registry has hit around 150 packages. The automatic propagation of the threat makes it especially dangerous — developers need to react ASAP.
28 articles
A new large-scale attack on a popular JavaScript code registry has hit around 150 packages. The automatic propagation of the threat makes it especially dangerous — developers need to react ASAP.
A popular developer tool has been trojanized and is uploading secrets to public GitHub repositories. We discuss what’s important to know for both developers and cybersecurity services.
How to respond to a compromised GitHub changed-files Action incident.
Takeaways for regular crypto holders from the biggest crypto heist in history.
Attacks on companies via their suppliers and contractors are becoming increasingly widespread. How can you manage this risk?
Malicious packages for AI integration containing infostealer malware were found in the Python Package Index repository.
Espionage operations to hack corporate routers are now commonplace — and all organizations need to be aware of this.
Even if you don’t know it, you probably have devices running Linux at home — and they need protection too! Here are three Linux threats that even IT professionals often forget about.
Cybercriminals are attacking 3CX VoIP telephony software users via trojanized applications.
New malicious campaign hunts for Discord tokens and credit card information via infected npm packages.
Five arguments in favor of installing security solutions on the endpoints of a small company.
Hackers from Lapsus$ group claim they breached Okta, a major provider of access management systems.
Researchers from Cambridge describe the Trojan Source method for inserting hidden implants in source code.
Npm package UAParser.js, installed on tens of millions of computers worldwide, has been infected with a password stealer and a miner. Here’s what to do.
Blocking a threat isn’t enough; you have to understand and reconstruct the whole infection chain.
Unknown attackers tried to add a backdoor to PHP scripting language source code.
Kaspersky was honored to take part in the 15th annual Internet Governance Forum.
Charles Perrault explains how hired hackers use social engineering and watering hole attacks for political purposes.
Small businesses may not be the main target of cybercriminals, but it does not mean an SMB will not fall victim to a supply-chain attack. How not to become collateral damage.
It appears the ASUS incident was just one part of the large-scale operation.