UNC1069 and the Axios npm Attack: Google Reveals North Korean Attribution
Cybercriminal and nation-state threat actors are increasingly shifting toward developer-ecosystem compromise and software supply chain abuse as a reliable avenue…
Cybercriminal and nation-state threat actors are increasingly shifting toward developer-ecosystem compromise and software supply chain abuse as a reliable avenue…
With ‘The Super Mario Galaxy Movie’ now in theaters, Shigeru Miyamoto has doused fans’ hopes for a major Nintendo crossover.
A chief medical information officer provided a peek into what hospitals face when they inevitably suffer a ransomware attack—whether it…
Need more shirtless Hugh Jackman in your life in increasingly specific contexts? Hasbro has you covered.
A financially motivated operation codenamed REF1695 has been observed leveraging fake installers to deploy remote access trojans (RATs) and cryptocurrency…
A financially motivated operation codenamed REF1695 has been observed leveraging fake installers to deploy remote access trojans (RATs) and cryptocurrency…
In December 2025, we shared the first-ever The State of Trusted Open Source report, featuring insights from our product data…
In December 2025, we shared the first-ever The State of Trusted Open Source report, featuring insights from our product data…
A CERT-UA spoofing campaign used fake security tools to spread remote access malware to numerous email addresses. CERT-UA used as…
Meta-owned messaging platform WhatsApp said it alerted about 200 users who were tricked into installing a bogus version of its…