In light of recent cyberattacks and growing security concerns, GitHub is taking immediate and direct action to secure the ...
A malicious npm package named Fezbox has been found using an unusual technique to conceal harmful code. The package employs a ...
"Each published package becomes a new distribution vector: as soon as someone installs it, the worm executes, replicates, and ...
What the Script: Supply chain attacks are traditionally designed to inflict maximum damage on structured organizations or companies. However, when such an attack compromises a supply chain that an ...
Ledger Chief Technology Officer Charles Guillemet on Monday urged crypto users to take immediate precautions following what appears to be a large-scale supply chain cyberattack targeting the ...
A trusted maintainer of JavaScript libraries was compromised, injecting 18 widely downloaded npm packages with malicious code. The code swaps transactions with similar-looking destination addresses.
A report by ReversingLabs found that threat actors used Ethereum smart contracts to conceal two npm packages used to spread malicious instructions. Cybercriminals are deploying a novel evasion tactic ...
Ethereum smart contracts used to hide URL to secondary malware payloads in an attack chain triggered by a malicious GitHub repo. Attackers behind a recent supply chain attack that involved rogue ...
With more than 4 million weekly downloads, the Nx build platform became the first known supply chain breach where hackers weaponized AI assistants for data theft. Hackers stole thousands of ...
Popular JavaScript libraries were hijacked this week and turned into malware droppers, in a supply chain attack achieved via targeted phishing and credential theft. The attacker(s) used stolen ...