Skip to content
information security Page 141

information security

The Unknown Risks of The Software Supply Chain: A Deep-Dive

The Unknown Risks of The Software Supply Chain: A Deep-Dive

?Jan 24, 2024?The Hacker NewsVulnerability / Software Security In a world where more & more organizations are adopting open-source components as foundational blocks in their application’s infrastructure, it’s difficult to consider traditional SCAs as complete… 

U.S., U.K., Australia Sanction Russian REvil Hacker Behind Medibank Breach

U.S., U.K., Australia Sanction Russian REvil Hacker Behind Medibank Breach

?Jan 24, 2024?NewsroomCryptocurrency / Cybercrime Governments from Australia, the U.K., and the U.S. have imposed financial sanctions on a Russian national for his alleged role in the 2022 ransomware attack against health insurance provider Medibank.… 

Malicious NPM Packages Exfiltrate Hundreds of Developer SSH Keys via GitHub

Malicious NPM Packages Exfiltrate Hundreds of Developer SSH Keys via GitHub

?Jan 23, 2024?NewsroomSoftware Security / Supply Chain Two malicious packages discovered on the npm package registry have been found to leverage GitHub to store Base64-encrypted SSH keys stolen from developer systems on which they were… 

MacOS Malware Hides in Cracked Apps, Targeting Crypto Wallets

MacOS Malware Hides in Cracked Apps, Targeting Crypto Wallets

?Jan 23, 2024?NewsroomMalware / Cryptocurrency Cracked software have been observed infecting Apple macOS users with a previously undocumented stealer malware capable of harvesting system information and cryptocurrency wallet data. Kaspersky, which identified the artifacts in…