Over the past year and a bit more, we’ve monitored a constellation of events that share a set of general attributes:
Malware impersonating, subverting, and...
Sep 27, 2025Ravie LakshmananMalware / Network Security
Telecommunications and manufacturing sectors in Central and South Asian countries have emerged as the target of an ongoing...
Introduction
The modern development world is almost entirely dependent on third-party modules. While this certainly speeds up development, it also creates a massive attack surface...
I notice a new URL showing up in our web honeypot logs, which looked a bit interesting:
/System/deviceInfo?auth=YWRtaW46MTEK
The full request:
GET /System/deviceInfo?auth=YWRtaW46MTEK
Host: 3.87.70.24
User-Agent: python-requests/2.32.4
Accept-Encoding: gzip, deflate
Accept:...
At least 187 code packages made available through the JavaScript repository NPM have been infected with a self-replicating worm that steals credentials from developers...