|
You are here |
www.sonatype.com | ||
| | | | |
www.proofpoint.com
|
|
| | | | | When distributing malware to potential victims, threat actors have various options for payload delivery. Malware can be attached to an email, or a direct link to the malicious file can be included | |
| | | | |
thehackernews.com
|
|
| | | | | A popular JavaScript NPM library with over 6 million weekly downloads was hijacked to publish crypto-mining malware. | |
| | | | |
www.reversinglabs.com
|
|
| | | | | Two recent versions of the Solana web3.js open source library were infected with code to steal private keys, putting crypto platforms and wallets at risk. | |
| | | | |
schmonz.com
|
|
| | | |||