Researchers uncovered 27 malicious npm packages used over five months to host phishing pages that steal credentials from ...
A newly discovered third variant of the Shai Hulud malware is raising fresh concerns about the security of the open-source software supply chain, as researchers warn that the latest version shows more ...
Infosecurity has selected five of the most significant vulnerability exploitation campaigns of 2025 that led to major ...
The human layer is one of the most vulnerable when it comes to crypto security, but authentication, hardware wallets, automation and strict verification habits are key to reducing risk.
An attacker seized control of Unleash Protocol’s multisig governance to upgrade contracts and siphon funds, which were later ...
The decentralized intellectual property platform Unleash Protocol has lost around $3.9 million worth of cryptocurrency after ...
The backdooring of more than 500 e-commerce companies, including a $40 billion multinational company. The source of the ...
The RondoDox botnet has been observed exploiting the critical React2Shell flaw (CVE-2025-55182) to infect vulnerable Next.js ...
A China-linked threat actor used malicious browser extensions over seven years to steal data and corporate intelligence from ...
Hackers behind the Shai Hulud malicious npm JavaScript campaign are likely testing a new variant of the malware. Security ...
The explosive, easy-to-trigger vulnerability was exploited within hours of disclosure, exposing the risks of default ...
Shai-Hulud 2.0 infected over 12,000 systems and exposed Trust Wallet keys that were used to steal $8.5 million from 2,520 ...