Thousands Download Malicious npm Libraries Impersonating Legitimate Tools – Go Health Pro

Thousands Download Malicious npm Libraries Impersonating Legitimate Tools – Go Health Pro

Dec 19, 2024Ravie LakshmananSupply Chain / Software Security Threat actors have been observed uploading malicious typosquats of legitimate npm packages such as typescript-eslint and @types/node that have racked up thousands of downloads on the package registry. The counterfeit versions, named @typescript_eslinter/eslint and types-node, are engineered to download a trojan and retrieve second-stage payloads, respectively. “While … Read more

Malware delivered via malicious QR codes sent in the post – Go Health Pro

Malware delivered via malicious QR codes sent in the post – Go Health Pro

Cybercriminals have adopted a novel trick for infecting devices with malware: sending out physical letters that contain malicious QR codes. Switzerland’s National Cyber Security Centre (NCSC) has issued a warning to the public about letters sent through the post that pretend to come from the Swiss Federal Office of Meteorology and Climatology (MeteoSwiss) that encourage … Read more

OpenAI Blocks 20 Global Malicious Campaigns Using AI for Cybercrime and Disinformation – Go Health Pro

OpenAI Blocks 20 Global Malicious Campaigns Using AI for Cybercrime and Disinformation – Go Health Pro

Oct 10, 2024Ravie LakshmananCybercrime / Disinformation OpenAI on Wednesday said it has disrupted more than 20 operations and deceptive networks across the world that attempted to use its platform for malicious purposes since the start of the year. This activity encompassed debugging malware, writing articles for websites, generating biographies for social media accounts, and creating … Read more

New Cryptojacking Attack Targets Docker API to Create Malicious Swarm Botnet – Go Health Pro

New Cryptojacking Attack Targets Docker API to Create Malicious Swarm Botnet – Go Health Pro

Cybersecurity researchers have uncovered a new cryptojacking campaign targeting the Docker Engine API with the goal of co-opting the instances to join a malicious Docker Swarm controlled by the threat actor. This enabled the attackers to “use Docker Swarm’s orchestration features for command-and-control (C2) purposes,” Datadog researchers Matt Muir and Andy Giron said in an … Read more

Malicious IoT Botnet Exercise Up Sharply – Go Well being Professional

Malicious IoT Botnet Exercise Up Sharply – Go Well being Professional

The Nokia Menace Intelligence Report 2023 has discovered that IoT botnet DDoS (Distributed Denial of Service) visitors, originating from a lot of insecure IoT units with the purpose of disrupting telecom community providers for tens of millions of customers, elevated fivefold over the previous yr, following Russia’s invasion of Ukraine and stemming from the rising … Read more