The security research team at JFrog, a provider of a platform for building and deploying software, have discovered a critical vulnerability in a node ...
The typosquatted packages auto-execute on installation, fingerprint victims by IP, and deploy a PyInstaller binary to harvest credentials from browsers, SSH keys, API tokens, and cloud configuration ...
A threat actor has published tens of thousands of malicious NPM packages that contain a self-replicating worm, security researchers warn.
The typosquatted “@acitons/artifact” package targeted GitHub’s CI/CD workflows, stealing tokens and publishing malicious ...
Recently, security researchers Socket found 10 packages on npm targeting software developers, specifically those who use the ...
An advanced malware campaign on the npm registry steals the very keys that control enterprise cloud infrastructure.
Researchers say the malware was in the repository for two weeks, advise precautions to defend against malicious packages.
Cybersecurity researchers have discovered a malicious npm package named "@acitons/artifact" that typosquats the legitimate " ...
Cybersecurity researchers have flagged a malicious Visual Studio Code (VS Code) extension with basic ransomware capabilities ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results