Aggregator
Удаленный запуск кода и захват системы. Владельцам техники GIGABYTE нужно срочно обновить софт
North Korean Hackers Compromise Widely Used Axios Package to Infect Windows, macOS, and Linux Systems
A major software supply chain attack has struck the JavaScript ecosystem after threat actors slipped a malicious dependency into the widely used axios NPM package. The poisoned releases, axios 1.14.1 and 0.30.4, pulled in plain-crypto-js and quietly delivered the WAVESHAPER.V2 backdoor to Windows, macOS, and Linux systems during installation. The incident is serious because axios […]
The post North Korean Hackers Compromise Widely Used Axios Package to Infect Windows, macOS, and Linux Systems appeared first on Cyber Security News.
Digital assets after death: Managing risks to your loved one’s digital estate
Hackers Hijack Axios npm Package to Spread RATs
SentinelOne autonomous detection blocks trojaned LiteLLM triggered by Claude Code
The Kernel’s Ghost Hunter: Unmasking Stealth Rootkits with klint
klint A Linux kernel integrity scanner that detects rootkits and kernel-level compromises. It works by cross-referencing multiple sources
The post The Kernel’s Ghost Hunter: Unmasking Stealth Rootkits with klint appeared first on Penetration Testing Tools.
CVE-2026-31975:Cloud CLI WebSocket Shell OS命令注入漏洞分析
Hackers Backdoor Telnyx Python SDK on PyPI to Steal Credentials Across Windows, macOS, and Linux
A threat actor group known as TeamPCP has been caught backdooring the Telnyx Python SDK on PyPI — a popular cloud communications library with over 700,000 downloads in February alone. On March 27, 2026, two malicious versions of the package, 4.87.1 and 4.87.2, were quietly published to the Python Package Index without any matching commits […]
The post Hackers Backdoor Telnyx Python SDK on PyPI to Steal Credentials Across Windows, macOS, and Linux appeared first on Cyber Security News.
Ninety Seconds to Compromise: The Viral Hijack of the Axios NPM Package
The ubiquitous axios library, an indispensable cornerstone of contemporary web development, has abruptly found itself at the epicenter
The post Ninety Seconds to Compromise: The Viral Hijack of the Axios NPM Package appeared first on Penetration Testing Tools.
The Spectral Proxy: How the RoadK1ll Malware Uses WebSockets to Vanish into Your Network
An imperceptible presence within a network remains the paramount trump card of digital malefactors, and a nascent discovery
The post The Spectral Proxy: How the RoadK1ll Malware Uses WebSockets to Vanish into Your Network appeared first on Penetration Testing Tools.
From Tornado Cash to Caesar’s Coins: The $53 Million Fall of the Uranium Finance Hacker
Within the United States, the exhaustive inquisition into the sensational subjugation of the cryptocurrency exchange Uranium Finance—which precipitously
The post From Tornado Cash to Caesar’s Coins: The $53 Million Fall of the Uranium Finance Hacker appeared first on Penetration Testing Tools.
The Invisible Shield: How macOS Tahoe 26.4 is Quietly Killing “ClickFix” Scams
Apple has surreptitiously fortified the defensive architecture of macOS, introducing a mechanism poised to rescue patrons from one
The post The Invisible Shield: How macOS Tahoe 26.4 is Quietly Killing “ClickFix” Scams appeared first on Penetration Testing Tools.
口服药有助于消除时差反应
Beyond the Scanner: How Hadrian Unmasks the Hidden Flaws in API Authorization
Unearthing a vulnerability within an Application Programming Interface is frequently a more labyrinthine endeavor than it initially appears.
The post Beyond the Scanner: How Hadrian Unmasks the Hidden Flaws in API Authorization appeared first on Penetration Testing Tools.
The 8-Year Sleeper: How IoliteLabs’ Solidity Extensions Became a Web3 Nightmare
The clandestine update of an antiquated Visual Studio Code extension has precipitously metamorphosed into a targeted siege upon
The post The 8-Year Sleeper: How IoliteLabs’ Solidity Extensions Became a Web3 Nightmare appeared first on Penetration Testing Tools.