Skip to content
InfosecToday.com
  • Cybersecurity News
  • Cybersecurity Articles
  • Cybersecurity Glossary
  • Contact
  • Login
InfosecToday.com

Malicious Packages

  • a close up of a metal object on a motherboard
    Cryptocurrency Theft | Malicious Packages | Software Supply Chain Attacks 

    Fake npm packages stealing Ethereum wallet keys

  • opened black laptop computer
    Credential Theft  | Malicious Software | Social Media Automation Tools 

    RubyGems and PyPI have both experienced attacks involving harmful packages that are designed to steal credentials and cryptocurrency

  • black flat screen computer monitor
    Modern Attack Techniques  | Python Package Vulnerabilities | Supply Chain Security

    Techniques for Preventing Python Supply Chain Attacks

  • shallow focus photography of computer codes
    Cybersecurity Threats | Malicious Software | Supply Chain Attacks

    WhatsApp developers are facing threats from malicious npm packages that come with a remote kill switch.

  • background pattern
    Cross-Platform Vulnerabilities  | Malicious Software | Supply Chain Risks

    Malicious Go and npm packages are spreading cross-platform malware that can initiate remote data erasure.

  • digital, binary code, abstract, background, matrix, display, technology, information, tech-savvy, computer, data, network, cyberspace, programming, coding, encryption, concept, cybersecurity, matrix background, digital matrix, binary digits, tech world, digital world, information age, ai generated, matrix, cybersecurity, cybersecurity, cybersecurity, cybersecurity, cybersecurity
    Cybersecurity Threats | Malware Distribution | Supply Chain Attacks

    North Korean cybercriminals are exploiting NPM packages to pilfer cryptocurrency and confidential information.

  • cyber, security, information, technology, hacker, secure, digital, protection, password, privacy, hacking, safety, business, attack, network, blue network, blue security, blue information, blue safety, security, hacker, hacking, hacking, hacking, hacking, hacking
    Cybersecurity

    Lazarus Hackers Exploit 234 Packages on npm and PyPI to Compromise Developers

© 2026 InfosecToday.com - WordPress Theme by Kadence WP

How cybersecure is your business? Take our free quiz and find out
Cyber risk scorecard
  • Cybersecurity News
  • Cybersecurity Articles
  • Cybersecurity Glossary
  • Contact
  • Login
Search