Skip to content
information security Page 160

information security

Malicious NPM Packages Exfiltrate Hundreds of Developer SSH Keys via GitHub

Malicious NPM Packages Exfiltrate Hundreds of Developer SSH Keys via GitHub

?Jan 23, 2024?NewsroomSoftware Security / Supply Chain Two malicious packages discovered on the npm package registry have been found to leverage GitHub to store Base64-encrypted SSH keys stolen from developer systems on which they were… 

MacOS Malware Hides in Cracked Apps, Targeting Crypto Wallets

MacOS Malware Hides in Cracked Apps, Targeting Crypto Wallets

?Jan 23, 2024?NewsroomMalware / Cryptocurrency Cracked software have been observed infecting Apple macOS users with a previously undocumented stealer malware capable of harvesting system information and cryptocurrency wallet data. Kaspersky, which identified the artifacts in… 

MavenGate Attack Could Let Hackers Hijack Java and Android via Abandoned Libraries

MavenGate Attack Could Let Hackers Hijack Java and Android via Abandoned Libraries

Several public and popular libraries abandoned but still used in Java and Android applications have been found susceptible to a new software supply chain attack method called MavenGate. “Access to projects can be hijacked through… 

NS-STEALER Uses Discord Bots to Exfiltrate Your Secrets from Popular Browsers

NS-STEALER Uses Discord Bots to Exfiltrate Your Secrets from Popular Browsers

?Jan 22, 2024?NewsroomBrowser Security / Cyber Threat Cybersecurity researchers have discovered a new Java-based “sophisticated” information stealer that uses a Discord bot to exfiltrate sensitive data from compromised hosts. The malware, named NS-STEALER, is propagated…