Impersonated Dev Tools on npm/PyPI Used for Credential Theft
The Socket Threat Research Team has discovered three malicious open-source packages—two on PyPI and one [...]
The Socket Threat Research Team has discovered three malicious open-source packages—two on PyPI and one [...]
Hackers have been using Cloudflare tunnels since February 2024 to host malware and spread remote [...]
A recent report from IBM X-Force reveals that infostealer malware delivered through phishing emails has [...]
Cybersecurity researchers recently uncovered a server linked to the KeyPlug malware, used by the threat [...]
A new wave of cyber espionage has highlighted BPFDoor, a stealthy malware used to secretly [...]