North Korea-linked attackers exploit CVE-2025-55182 to deploy EtherRAT, a smart-contract-based RAT with multi-stage ...
A new malware implant called EtherRAT, deployed in a recent React2Shell attack, runs five separate Linux persistence ...
The Chinese are not the only ones exploiting React2Shell, a maximum-severity vulnerability that was recently discovered in ...
Attacks exploiting the recently emerged React vulnerability dubbed React2Shell appear to have been conducted by North Korean ...
North Korean hackers intensify their efforts against blockchain and Web3 developers, using nearly 200 malicious npm packages ...
Node-forge cryptography library flaw (CVE-2025-12816) allowed bypass of signature and certificate validation CERT-CC warns of ...
A new campaign involving 19 malicious Visual Studio Code extensions used a legitimate npm package to embed malware in ...
North Korean actors deployed 197 new npm packages delivering evolved OtterCookie and GolangGhost malware through fake interview schemes.
Regtech firm SlowMist noted that recently, the NPM ecosystem experienced another large-scale package poisoning incident.
Sha1-Hulud malware is an aggressive npm supply-chain attack compromising CI/CD and developer environments. This blog addresses frequently asked questions and advises cloud security teams to ...
Dr. James McCaffrey presents a complete end-to-end demonstration of anomaly detection using k-means data clustering, ...
The originators of the Contagious Interview cyberattack campaign are stitching GitHub, Vercel, and NPM together into a ...