Researchers say they’ve discovered a supply-chain attack flooding repositories with malicious packages that contain invisible code, a technique that’s flummoxing traditional defenses designed to ...
UNC6426 used stolen GitHub tokens from the 2025 nx npm breach to gain AWS admin access in under 72 hours, enabling data theft and cloud destruction.
GlassWorm campaign used 72 malicious Open VSX extensions and infected 151 GitHub repositories, enabling stealth supply-chain attacks on developers.
In our incident analysis, we examined more than 30,000 attacker dumps and tied the exposed secrets to 1,195 organizations worldwide, including banks, government bodies and large technology companies.
Supply-chain cyberattacks have entered a more aggressive phase: extortion. Instead of quietly stealing data or slipping malware into a software update, attackers increasingly pressure organizations to ...
Straiker found 71 Claude Skills that are overtly malicious, and a further 73 that exhibit high-risk behaviors.
Cyber attackers have learned something that many manufacturers have yet to fully absorb: The fastest path into a heavily regulated enterprise often runs through its supply chain. Banks, defense ...
Polyfill supply chain attack that hit more than 100,000 websites has now been linked to North Korean threat actors.
Backups alone can’t secure today’s digitally connected manufacturing ecosystems. Cyber resilience is essential to protecting ...
An Iranian hacker group claimed responsibility for the attack on the Stryker Corporation, which affected thousands of employees using the company’s Microsoft systems.