North Korean Hackers Deploy 197 npm Packages to Spread Updated OtterCookie Malware
The North Korean threat actors behind the Contagious Interview campaign have continued to flood the npm registry with 197 more…
The North Korean threat actors behind the Contagious Interview campaign have continued to flood the npm registry with 197 more…
Cybersecurity researchers have discovered vulnerable code in legacy Python packages that could potentially pave the way for a supply chain…
As IT environments become increasingly distributed and organizations adopt hybrid and remote work at scale, traditional perimeter-based security models and…
The threat actor known as Bloody Wolf has been attributed to a cyber attack campaign that has targeted Kyrgyzstan since…
Microsoft has announced plans to improve the security of Entra ID authentication by blocking unauthorized script injection attacks starting a…
If you’re using community tools like Chocolatey or Winget to keep systems updated, you’re not alone. These platforms are fast,…
Hackers have been busy again this week. From fake voice calls and AI-powered malware to huge money-laundering busts and new…
Gainsight has disclosed that the recent suspicious activity targeting its applications has affected more customers than previously thought. The company…
The second wave of the Shai-Hulud supply chain attack has spilled over to the Maven ecosystem after compromising more than…
If you’re using community tools like Chocolatey or Winget to keep systems updated, you’re not alone. These platforms are fast,…