Popular npm linter packages hijacked via phishing to drop malware
Popular JavaScript libraries were hijacked this week and turned into malware droppers, in a supply chain attack achieved via targeted phishing...
Read more →Popular JavaScript libraries were hijacked this week and turned into malware droppers, in a supply chain attack achieved via targeted phishing...
Read more →I’ve been experiencing growing frustration with social/political issues lately, and each time I get to thinking about various problems that...
Read more →GPT-5 might be just a few days or weeks away, as we’ve spotted references to a new model called gpt-5-reasoning-alpha-2025-07-13....
Read more →A sophisticated phishing campaign targeting Turkish defense and aerospace enterprises has emerged, delivering a highly evasive variant of the Snake...
Read more →Language Matters > Clarified Definitions > A Physical Analog > The Exploitation Angle > Pentests Don’t Include VA > Summary...
Read more →A sophisticated Chinese threat actor campaign has emerged as one of the most persistent malware distribution operations targeting Chinese-speaking communities...
Read more →Language Matters > Clarified Definitions > A Physical Analog > The Exploitation Angle > Pentests Don’t Include VA > Summary...
Read more →A sophisticated phishing campaign targeting organizations has emerged, exploiting the trusted reputation of Veeam Software through weaponized WAV audio files...
Read more →After reporting last week that the “raw” Jeffrey Epstein prison video posted by the FBI was likely modified in at...
Read more →iptables is the packet filtering technology that’s built into the 2.4 Linux kernel. It’s what allows one to do firewalling,...
Read more →A critical zero-day flaw in the CrushFTP managed file-transfer platform was confirmed after vendor and threat-intelligence sources confirmed active exploitation...
Read more →The time has come to dump Internet Explorer. I know, I know — you may have heard the same thing...
Read more →