 
      
    | You are here | blog.checkpoint.com | ||
| | | | | www.sysdig.com | |
| | | | | A new supply chain attack against the NPM repository is using novel, self-propagating malware (also known as a worm) to continue spreading itself. | |
| | | | | www.reversinglabs.com | |
| | | | | Two recent versions of the Solana web3.js open source library were infected with code to steal private keys, putting crypto platforms and wallets at risk. | |
| | | | | www.sonatype.com | |
| | | | | Sonatype's malware detection identified a malicious PyPI package called crytic-compilers, connected to Russia-linked Lumma Windows stealer. Learn More. | |
| | | | | www.datadoghq.com | |
| | | Learn how the Log4Shell vulnerability works, how to detect it, and how Datadog can help you secure your systems. | ||