10 npm Packages Caught Stealing Developer Credentials on Windows, macOS, and Linux
Oct 29, 2025Ravie LakshmananMalware / Threat Intelligence Cybersecurity researchers have discovered a set of 10 malicious npm packages that are...
Oct 29, 2025Ravie LakshmananMalware / Threat Intelligence Cybersecurity researchers have discovered a set of 10 malicious npm packages that are...
Threat actors tied to North Korea have been observed targeting the Web3 and blockchain sectors as part of twin campaigns...
26 October 2025 It was the Synthient threat data that ate most of my time this week, and it continues...
Oct 24, 2025Ravie LakshmananData Breach / Cybercrime The threat actors behind a large-scale, ongoing smishing campaign have been attributed to...
Oct 24, 2025Ravie LakshmananCyber Espionage / Malware A Pakistan-nexus threat actor has been observed targeting Indian government entities as part...
Oct 23, 2025Ravie LakshmananCyber Espionage / Threat Intelligence Threat actors with ties to North Korea have been attributed to a...
Oct 23, 2025Ravie LakshmananVulnerability / Threat Intelligence The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a critical...
A literal insider threat: we head to a Romanian prison where “self-service” web kiosks allowed inmates to run wild. Then...
Google threat researchers in May disclosed LostKeys, a malware used by the Russia state-sponsored cyber-espionage group Coldriver, which has...
Image: Adobe Stock AI-powered threat intelligence company Dataminr has announced plans to acquire cybersecurity firm ThreatConnect in a deal valued...
Oct 21, 2025Ravie LakshmananCyber Espionage / Threat Intelligence A new malware attributed to the Russia-linked hacking group known as COLDRIVER...
The Chinese state-sponsored threat actors believed to be behind the high-profile hack of F5’s corporate networks reportedly infiltrated the security...
The threat actors behind a malware family known as Winos 4.0 (aka ValleyRAT) have expanded their targeting footprint from China...
The North Korean threat actor linked to the Contagious Interview campaign has been observed merging some of the functionality of...
The Counter Threat Unit™ (CTU) research team analyzes security threats to help organizations protect their systems. Based on observations in...