ThreatDown Uncovers First Cyber Attack Abusing Deno JavaScript Runtime for Fileless Malware Delivery
ThreatDown’s EDR team discovered a sophisticated, multi-stage attack chain during an active investigation; the first documented case of attackers abusing the Deno runtime as a malware execution ...
Malicious Lightning 2.6.2/2.6.3 released April 30 enable credential theft via hidden payload, leading to PyPI quarantine and ...
GitHub facades and Ethereum smart contracts power a March 2026 admin-targeted campaign, enabling resilient C2 rotation and ...
Morning Overview on MSN
Malicious open-source packages surge 73% in 2026 as threat actors weaponize the software supply chain
In the first five months of 2026, security researchers have flagged more malicious packages on the npm registry than in all ...
Attackers infected all versions with the same credential-stealing malware that, on Wednesday, poisoned multiple npm packages ...
A new report from ReversingLabs identified a new tactic by North Korean hackers: feeding malicious code to the AI systems ...
Several npm packages for SAP's cloud application development ecosystem have been compromised as TeamPCP's supply chain ...
Multiple official SAP npm packages were compromised in what is believed to be a TeamPCP supply-chain attack to steal ...
Cryptopolitan on MSN
Hacker target the OpenVSX ecosystem to steal crypto wallets
GlassWorm, a known malware, has put 73 harmful extensions into OpenVSX's registry. Hackers use it to steal developers' crypto ...
A malicious npm dependency slipped into an AI-assisted crypto trading project has exposed how automated coding tools can be manipulated into importing software that steals credentials, wallet data and ...
A malicious version of the PyTorch Lightning package published on the Python Package Index (PyPI) delivers a ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results