thumbnail Malicious PyPI Package Targets Discord Developers with Remot...
thumbnail Using Trusted Protocols Against You: Gmail as a C2 Mechanism...
thumbnail JFrog Detects Malicious PyPi package Stealing Crypto Tokens
thumbnail Malware found on npm infecting local package with reverse shell
thumbnail Malicious extensions circumvent Google’s remote code ban
thumbnail A new playground: Malicious campaigns proliferate from VSCode to npm
thumbnail Malicious Ads in Search Results Are Driving New Generations of Scams | WIRED
thumbnail Python Crypto Library Updated to Steal Private Keys
thumbnail HijackLoader evolution: abusing genuine signing certificates
thumbnail Hacker plants false memories in ChatGPT to steal user data in perpetuity
thumbnail Malicious Plugin
thumbnail China-Linked Hackers Compromise ISP to Deploy Malicious Software Updates
thumbnail PyPI halted new users and projects while it fended off supply-chain attack
thumbnail New Go loader pushes Rhadamanthys stealer
thumbnail GitHub besieged by millions of malicious repositories in ongoing attack | Ars Technica
thumbnail Disrupting malicious uses of AI by state-affiliated threat actors
thumbnail Malicious NPM Packages Exfiltrate Hundreds of Developer SSH Keys via GitHub
thumbnail Why Join The Navy If You Can Be A Pirate?
thumbnail Toward Ending the Domain Wars: Early Detection of Malicious Stockpiled Domains
thumbnail A pernicious potpourri of Python packages in PyPI
thumbnail The evolutionary tale of a persistent Python threat 
thumbnail Fake CVE-2023-40477 Proof of Concept Leads to VenomRAT
thumbnail An Ongoing Open Source Attack Reveals Roots Dating Back To 2021
thumbnail Security advisory: malicious crate rustdecimal
thumbnail Hackers exploit gaping Windows loophole to give their malware kernel access
thumbnail Microsoft Revokes Malicious Drivers in Patch Tuesday Culling
thumbnail Operation Brainleeches: Malicious npm packages fuel supply chain and phishing attacks
thumbnail How malicious extensions hide running arbitrary code
thumbnail Malicious VSCode extensions with more than 45K downloads steal PII and enable backdoors - Check Point Blog
thumbnail Threat Actors Rapidly Adopt Web3 IPFS Technology
thumbnail Qakbot mechanizes distribution of malicious OneNote notebooks
thumbnail A Noteworthy Threat: How Cybercriminals are Abusing OneNote
thumbnail Breaking Down the SEO Poisoning Attack | How Attackers Are Hijacking Search Results
thumbnail Threat Spotlight: XLLing in Excel - threat actors using malicious add-ins
thumbnail Android SharkBot Droppers on Google Play Underline Platform's Security Needs
thumbnail Massive ois[.]is Black Hat Redirect Malware Campaign
thumbnail The Case of Cloud9 Chrome Botnet
thumbnail Malicious App Developer Remains on Google Play
thumbnail “Dormant Colors”: Live Campaign With Over 1M Data Stealing Extensions Installed
thumbnail Malicious WhatsApp mod distributed through legitimate apps
thumbnail Malicious Cookie Stuffing Chrome Extensions with 1.4 Million Users
thumbnail Investigation report about the abuse of the Mac Appstore | by Privacy1St
thumbnail CrateDepression | Rust Supply-Chain Attack Infects Cloud CI Pipelines with Go Malware
thumbnail Google Online Security Blog: The Package Analysis Project: Scalable detection of malicious open source packages