Malicious Rspack, Vant packages published using stolen NPM tokens
Three popular npm packages, @rspack/core, @rspack/cli, and Vant, were compromised through stolen npm account tokens, allowing threat actors to publish…
Three popular npm packages, @rspack/core, @rspack/cli, and Vant, were compromised through stolen npm account tokens, allowing threat actors to publish…
Today’s cloud security categories don’t do practitioners any favors when it comes to identifying the key requirements for detection and…
A threat actor tracked as MUT-1244 has stolen over 390,000 WordPress credentials in a large-scale, year-long campaign targeting other threat…
The popular Ultralytics YOLO11 AI model was compromised in a supply chain attack to deploy cryptominers on devices running versions…
Secure by Demand offers a starting point for third-party risk management teams, but they need to take the essential step…
A new report from the Open Software Supply Chain Attack Reference (OSC&R) team provides a framework to reduce how much…
The SEC has charged four companies—Unisys Corp, Avaya Holdings, Check Point Software, and Mimecast—for allegedly misleading investors about the impact…
Adversaries reusing abandoned package names sneak malware into organizations in a sort of software shell game.
Defending business against cyberattack Encryption of Data at Rest: The Cybersecurity Last Line of Defense In the ever-evolving landscape of…
Stolen credentials are a big problem, commonly used to breach networks in attacks. Learn more from Specops Software about checking…