supply chain attacks

Hackers Weaponize Security Testing By Weaponizing npm, PyPI, & Ruby Exploit PackagesHackers Weaponize Security Testing By Weaponizing npm, PyPI, & Ruby Exploit Packages

Hackers Weaponize Security Testing By Weaponizing npm, PyPI, & Ruby Exploit Packages

Over the past year, malicious actors have been abusing OAST services for data exfiltration, C2 channel establishment, and multi-stage attacks…

3 months ago
Beware Of Malicious PyPI Packages That Inject infostealer MalwareBeware Of Malicious PyPI Packages That Inject infostealer Malware

Beware Of Malicious PyPI Packages That Inject infostealer Malware

Recent research uncovered a novel crypto-jacking attack targeting the Python Package Index (PyPI), where malicious actors uploaded a legitimate-seeming cryptocurrency…

5 months ago
Malicious NuGet Campaign Tricking Developers To Inject Malicious CodeMalicious NuGet Campaign Tricking Developers To Inject Malicious Code

Malicious NuGet Campaign Tricking Developers To Inject Malicious Code

Hackers often target NuGet as it's a popular package manager for .NET, which developers widely use to share and consume…

9 months ago
Beware Of New Malicious PyPI Packages That Steal Wallet PasswordsBeware Of New Malicious PyPI Packages That Steal Wallet Passwords

Beware Of New Malicious PyPI Packages That Steal Wallet Passwords

Threat actors use malicious PyPI packages to infiltrate systems and execute various attacks like data exfiltration, ransomware deployment, or system…

1 year ago
Operation Red Signature Deliver’s Malware to Target Organizations Through Outside Partner NetworkOperation Red Signature Deliver’s Malware to Target Organizations Through Outside Partner Network

Operation Red Signature Deliver’s Malware to Target Organizations Through Outside Partner Network

Supply Chain Attacks occurs is an advanced threat that determines the weak link in the supply chain to infiltrate into…

7 years ago