North Korea-linked attackers exploit CVE-2025-55182 to deploy EtherRAT, a smart-contract-based RAT with multi-stage ...
A new malware implant called EtherRAT, deployed in a recent React2Shell attack, runs five separate Linux persistence ...
A popular JavaScript cryptography library is vulnerable in a way which could allow threat actors to break into user accounts.
A vulnerability in the 'node-forge' package, a popular JavaScript cryptography library, could be exploited to bypass ...
Attacks exploiting the recently emerged React vulnerability dubbed React2Shell appear to have been conducted by North Korean ...
YouTube's specifications are extremely complex and change frequently. The yt-dlp development team previously supported YouTube using a method that heavily relied on regular expressions. However, in ...
North Korean hackers intensify their efforts against blockchain and Web3 developers, using nearly 200 malicious npm packages ...
North Korean actors deployed 197 new npm packages delivering evolved OtterCookie and GolangGhost malware through fake ...
Shai-Hulud malware infiltrates 490 NPM packages, stealing API keys and credentials from ENS and major crypto development environments.
Regtech firm SlowMist noted that recently, the NPM ecosystem experienced another large-scale package poisoning incident.
Sha1-Hulud malware is an aggressive npm supply-chain attack compromising CI/CD and developer environments. This blog addresses frequently asked questions and advises cloud security teams to ...