Aggregator
CVE-2023-34990 | Fortinet FortiWLM up to 8.5.4/8.6.5 Web Request path traversal (FG-IR-23-144)
Ellen Sundra Joins Horizon3.ai as Vice President, Customers
Hunters
Роскомнадзор начнёт получать данные о попытках обхода блокировок
CVE-2024-54350 | HJYL hmd Plugin up to 2.0 on WordPress cross site scripting
Black Basta
CVE-2024-56058 | Gueststream VRPConnector Plugin up to 2.0.1 on WordPress deserialization
CVE-2024-56016 | WPTooling Image Mapper Plugin up to 0.2.5.3 on WordPress cross site scripting
CVE-2024-56010 | PerfOps One Device Detector Plugin up to 4.2.0 on WordPress cross site scripting
CVE-2024-4996 | Asseco Business Solutions Wapro ERP Desktop prior 8.90.0 hard-coded credentials
The Benefits of Serverless Computing Architecture
A new playground: Malicious campaigns proliferate from VSCode to npm
ReversingLabs researchers have been monitoring multiple public repositories over the past few years. Recently, our team has expanded its threat hunting efforts to VSCode Marketplace — and the researchers started to see an increasing amount of malicious activity.
In the past, RL researchers have observed how easy and quickly it is for supply chain attacks to proliferate from the npm community to VSCode Marketplace. Using npm packages, threat actors can get malicious code into VSCode IDE as well, which is often overlooked as a potential source of compromise.
In November 2024, this proliferation changed direction. A month later, a campaign that started on VSCode emerged in the npm community with malicious npm package etherscancontracthandler, bearing a striking resemblance to previously seen malicious VSCode extensions.
The post A new playground: Malicious campaigns proliferate from VSCode to npm appeared first on Security Boulevard.