North Korea-linked attackers exploit CVE-2025-55182 to deploy EtherRAT, a smart-contract-based RAT with multi-stage ...
A new malware implant called EtherRAT, deployed in a recent React2Shell attack, runs five separate Linux persistence ...
Attacks exploiting the recently emerged React vulnerability dubbed React2Shell appear to have been conducted by North Korean ...
Sysdig finds evidence of Contagious Interview actors abusing React2Shell.
Sysdig has found sophisticated malicious campaigns exploiting React2Shell that delivered EtherRAT and suggested North Korean ...
Sha1-Hulud malware is an aggressive npm supply-chain attack compromising CI/CD and developer environments. This blog addresses frequently asked questions and advises cloud security teams to ...
North Korean actors deployed 197 new npm packages delivering evolved OtterCookie and GolangGhost malware through fake interview schemes.
The originators of the Contagious Interview cyberattack campaign are stitching GitHub, Vercel, and NPM together into a ...
Dr. James McCaffrey presents a complete end-to-end demonstration of anomaly detection using k-means data clustering, ...
A package with 26 million weekly downloads carried a major flaw which has since been addressed.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results