Malicious npm Package Targets Developers for Supply Chain Attack
The Socket Research Team has uncovered a malicious npm package@ton-wallet/create designed to steal sensitive cryptocurrency wallet keys from developers and users in the TON blockchain…
The Socket Research Team has uncovered a malicious npm package@ton-wallet/create designed to steal sensitive cryptocurrency wallet keys from developers and users in the TON blockchain…
Email encryption is an essential protection for modern businesses. The software market has adapted to this need, so leaders have a broad range of potential…
Silver Fox, a China-based threat actor that may or may not be backed by the Chinese government, has been delivering the ValleyRAT backdoor to unsuspecting…
Cybersecurity researchers uncovered a sophisticated macOS malware campaign distributing the Poseidon Stealer through a counterfeit DeepSeek AI platform website. This malware-as-a-service (MaaS) operation employs advanced…
Enacted in 1996, the Health Insurance Portability and Accountability Act (HIPAA) has been the regulatory standard for U.S. healthcare providers, health organizations, and health data…
Dive Brief: GreyNoise researchers observed active exploitation of two Cisco vulnerabilities, CVE-2018-0171 and CVE-2023-20198, which reportedly have been used in recent attacks by the Chinese nation-state…
INE, the leading provider of networking and cybersecurity training and certifications, today announced its recognition as an enterprise and small business leader in online course…
Employment screening company DISA Global Solutions has filed a data breach notification after a cyber incident on their network. DISA says a third party had…
EU sanctioned the leader of North Korea-linked APT groups Pierluigi Paganini February 25, 2025 The European Union sanctioned the leader of North Korea-linked APT groups…
The traditional perception of security within an organization is as a barrier rather than a facilitator, imposing approval processes and regulations that inevitably slow down…
Andrzej Matykiewicz | 25 February 2025 at 14:34 UTC In today’s rapidly evolving digital landscape, securing web applications at scale is a challenge, even for…
In an era where open-source collaboration drives software innovation, a sophisticated cyber campaign dubbed GitVenom has emerged as a critical threat to developers. Security researchers…