supply chain attack

  1. Solana-Scan Infostealer: Malicious NPM Packages Steal Wallet Keys

    A cluster of malicious npm packages — cataloged by researchers as a targeted infostealer campaign dubbed “Solana‑Scan” — has been used to lure Solana ecosystem developers into installing backdoored SDKs that harvest wallet credentials, local keyfiles and a broad sweep of developer artifacts...
  2. Npm Supply Chain Attack: Malware Campaign Compromises Popular Packages & Developer Security

    The npm JavaScript ecosystem has once again been rocked by a coordinated malware campaign, this time targeting both cross-platform and Windows-specific environments through widely trusted packages. The incident, centered around the highly popular "is" package and several linting tools associated...
  3. Securing the Software Supply Chain: Key Strategies to Mitigate Growing Cyber Risks

    The digital fabric of today’s global economy is increasingly woven together by vast, interconnected software supply chains. While this complex ecosystem accelerates innovation and business agility, it also conceals a growing vulnerability: persistent blind spots that cybercriminals are eager to...
  4. Commvault SaaS Breach Highlights Supply Chain Risks in Cloud Data Protection

    The sudden exposure of key Commvault infrastructure has ignited urgent concern among SaaS providers and cybersecurity professionals alike, highlighting an increasingly complex threat landscape for cloud-based data protection platforms. The U.S. Cybersecurity and Infrastructure Security Agency...
  5. NPM Supply Chain Attack: How Malicious Packages Harvest Data & Threaten DevOps Security

    Amid growing concerns over open-source software security, a recent campaign targeting the npm ecosystem has underscored the persistent vulnerabilities in modern development pipelines. According to research by Socket’s Threat Research Team, a coordinated attack has seen at least 60 malicious npm...
  6. Emerging Cyber Threats and Defenses: Supply Chain Attacks, AI Hallucinations, and Cloud Security in 2025

    As cybersecurity threats continuously evolve, last week underscored just how varied and sophisticated the modern threat landscape can be. From ingenious methods for initial compromise to the persistent challenges of AI hallucinations, the headlines and interviews offered stark reminders for the...
  7. Noodlophile Malware Campaign: AI Video Scam & Stealthy Data Theft on Windows

    Enticing users with the promise of AI-powered video creation, cybercriminals have launched a new campaign distributing a previously undocumented malware family, Noodlophile, strategically camouflaged as cutting-edge video generation tools. This campaign uses the allure of widely hyped artificial...