NPM Supply Chain Attack: Sophisticated Multi-Chain Cryptocurrency Drainer Infiltrates Popular Packages
A sophisticated npm supply chain attack compromised popular packages
Fake VS Code Extension on npm Spreads Multi-Stage Malware
Learn about a fake VS-code extension on npm—truffelvscode—typosquatting the popular truffle for VS-code extension.
CVE-2024-50379: A Critical Race Condition in Apache Tomcat
An Apache Tomcat web server vulnerability has been published, exposing the platform to remote code execution through a race condition failure.
The @Solana/web3.js Incident: Another Wake-Up Call for Supply Chain Security
This post covers the attack flow, how it happened, and the importance of supply chain security.
More than 100K sites impacted by Polyfill supply chain attack
The new Chinese owner tampers with the code of cdn.polyfill.io to inject malware targeting mobile devices.
Critical Backdoor Found in XZ Utils (CVE-2024-3094) Enables SSH Compromise 1
Discover how CVE-2024-3094 affects XZ Utils and enables SSH compromise. Get insights on detection, mitigation, and system security.
Over 100 Malicious Packages Target Popular ML PyPi Libraries
Discover the latest security threat as over 100 malicious packages target popular ML PyPi libraries. Learn about the attack methods.
What is LDAP Injection? Types, Examples and How to Prevent It
Learn what LDAP Injection is, its types, examples, and how to prevent it. Secure your applications against LDAP attacks.
There’s a New Stealer Variant in Town, and It’s Using Electron to Stay Fully Undetected
Discover the latest threat in town - a new info-stealer variant using Electron to remain undetected. Learn about its attack flow.
The Unseen Risks of Open Source Dependencies: The Case of an Abandoned Name
Mend.io research discovered a threat actor takeover of the name ‘gemnasium-gitlab-service', a retired Ruby gem with two million+ downloads.
Deceptive ‘Vibranced’ npm Package Discovered Masquerading as Popular ‘Colors’ Package
Discover the threat of the 'Vibranced' npm package masquerading as 'Colors'. Learn about its stages of execution, obfuscation techniques.
Join our subscriber list to get the latest news and updates
Thanks for signing up!