Hackers have compromised virtually all versions of Aqua Security’s widely used Trivy vulnerability scanner in an ongoing ...
The GlassWorm supply-chain campaign has returned with a new, coordinated attack that targeted hundreds of packages, ...
GlassWorm campaign injects malware into GitHub Python repos using stolen tokens since March 8, 2026, exposing developers to ...
CanisterWorm infects 28 npm packages via ICP-based C2, enabling self-propagation and persistent backdoor access across developer systems.
Threat actors are publishing clean extensions that later update to depend on hidden payload packages, bypassing marketplace ...
GlassWorm attack uses stolen GitHub tokens to inject malware into Python repositories, exposing developers to supply chain risks.
Researchers say they’ve discovered a supply-chain attack flooding repositories with malicious packages that contain invisible code, a technique that’s flummoxing traditional defenses designed to ...
CrowdStrike's 2026 report finds 82% of attacks are malware-free, breakout times average 29 minutes, and adversaries exploit trust in identities, cloud, and supply chains.
A new report out today from managed detection and response company Expel Inc. details a newly identified variant of the Shai Hulud malware that is demonstrating how software supply chain attacks are ...
Cybersecurity firm Kaspersky has released reports revealing alarming trends in digital threats. One highlights a surge in mobile banking malware.
The Open VSX registry rotated access tokens after they were accidentally leaked by developers in public repositories and allowed threat actors to publish malicious extensions in a supply chain attack.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results