Fake Party Invites and the Rise of Social Phishing Attacks
Attackers are now impersonating invitation services to trick people into clicking malicious links and sharing sensitive information. These phishing attempts...
Attackers are now impersonating invitation services to trick people into clicking malicious links and sharing sensitive information. These phishing attempts...
The post Malicious PyTorch Lightning Packages Found on PyPI appeared first on 2024 Sonatype Blog. TL;DR Two malicious versions of...
Intro A sophisticated, high-resilience malicious campaign was identified by Atos Threat Research Center (TRC) in March 2026. This operation specifically...
Cybersecurity researchers have discovered malicious code in an npm package after a malicious package as a dependency to the project...
Cybersecurity researchers have discovered a set of malicious apps on the Apple App Store that impersonate popular cryptocurrency wallets in...
Ravie LakshmananApr 22, 2026Cloud Security / Software Security Cybersecurity researchers have warned of malicious images pushed to the official "checkmarx/kics"...
In some compromised repositories, we observed both techniques being present simultaneously (i.e., the malicious .vscode/tasks.json alongside the appended obfuscated JavaScript)....
Cybersecurity researchers have revealed that 108 malicious Google Chrome extensions have been quietly stealing user credentials, hijacking Telegram sessions, and...
Ravie LakshmananApr 16, 2026Botnet / Cryptomining Cybersecurity researchers have warned of an active malicious campaign that's targeting the workforce in...
Image: Justin Morgan/Unsplash A web developer discovered dozens of malicious WordPress plugins with buried backdoors that had compromised thousands of...
Discover the rising threat of malicious password-protected files, evading defenses via encryption and alternative channels. *** This is a Security...
The North Korea-linked persistent campaign known as Contagious Interview has spread its tentacles by publishing malicious packages targeting the Go, Rust, and...
Ravie LakshmananApr 05, 2026Malware / DevSecOps Cybersecurity researchers have discovered 36 malicious packages in the npm registry that are disguised...
| Active RAT | Malicious npm versions removed | Assess all systems that ran npm install during exposure window...
On March 31, 2026, two malicious versions of Axios – the JavaScript HTTP client with over 83 million weekly...