Impersonated Dev Tools on npm/PyPI Used for Credential Theft
The Socket Threat Research Team has discovered three malicious open-source packages—two on PyPI and one [...]
The Socket Threat Research Team has discovered three malicious open-source packages—two on PyPI and one [...]
Hackers have been using Cloudflare tunnels since February 2024 to host malware and spread remote [...]
A recent report from IBM X-Force reveals that infostealer malware delivered through phishing emails has [...]
Cybersecurity researchers recently uncovered a server linked to the KeyPlug malware, used by the threat [...]
Attackers are now using server-side phishing to target employee and member login portals, making it [...]