Attackers are exploiting a major weakness that has allowed them access to the NPM code repository with more than 100 credential-stealing packages since August, mostly without detection.
A new supply chain attack dubbed PhantomRaven has flooded the npm registry with malicious packages that steal credentials, ...
Researchers outline how the PhantomRaven campaign exploits hole in npm to enable software supply chain attacks.
Supply chain security company Safety has discovered a trojan in NPM that masqueraded as Anthropic’s popular Claude Code AI ...
For the past four months, over 130 malicious NPM packages deploying information stealers have been collectively downloaded ...
An active campaign named 'PhantomRaven' is targeting developers with dozens of malicious npm packages that steal ...
Having another security threat emanating from Node.js’ Node Package Manager (NPM) feels like a weekly event at this point, ...
The ongoing ‘PhantomRaven’ malicious campaign has infected 126 npm packages to date, representing 86,000 downloads ...
The npm packages were available since July, have elaborately obfuscated malicious routines, and rely on a fake CAPTCHA to ...
The typosquatted packages auto-execute on installation, fingerprint victims by IP, and deploy a PyInstaller binary to harvest ...
Vibecoding. What could possible go wrong? That’s what [Kevin Joensen] of Baldur wondered, and to find out he asked ...
An advanced malware campaign on the npm registry steals the very keys that control enterprise cloud infrastructure.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results