A threat actor has used 36 malicious NPM packages posing as Strapi plugins to distribute malware targeting Redis, Docker, and ...
Infosecurity outlines key recommendations for CISOs and security teams to implement safeguards for AI-assisted coding ...
Without an identity layer, AI agents accessing enterprise tools create real exposure: data exfiltration through unscoped ...
Although executed by different attackers – Axios by North Korean-linked goons, and Trivy et al. by a loosely knit band of ...
In early April 2025, security researchers confirmed that North Korean state-sponsored hackers had successfully compromised the Axios HTTP library. It is one ...
Two CISOs dissect the Axios npm attack, revealing a self-erasing RAT, CI/CD compromise risks and why open-source software ...
Phishing surge, LinkedIn tracking claims, spyware use, and rising stealers expose growing abuse of trusted systems.
An emerging threat cluster is exploiting vulnerable Web-exposed Next.js apps and using an automated tool to steal credentials ...
Chrome extensions were spotted leaking sensitive browser data like API keys, secrets, and tokens via unguarded HTTP ...
The open-source IAM system Keycloak 26.6 promotes five features to production status – including federated client ...
A new wave of device code phishing shows how threat actors are scaling account compromise using AI and end‑to‑end automation.
Некоторые результаты скрыты, так как они могут быть недоступны для вас.
Показать недоступные результаты