Aggregator
Threat Actors Hijack Popular npm Packages to Steal The Project Maintainers’ npm Tokens
A sophisticated supply chain attack has compromised several widely-used npm packages, including eslint-config-prettier and eslint-plugin-prettier, after threat actors successfully stole maintainer authentication tokens through a targeted phishing campaign. The attack leveraged a typosquatted domain, npnjs.com, designed to mimic the legitimate npmjs.org site and harvest developer credentials through convincing phishing emails. The malicious campaign represents a […]
The post Threat Actors Hijack Popular npm Packages to Steal The Project Maintainers’ npm Tokens appeared first on Cyber Security News.
CVE-2025-7241 | CADImage Plugin on IrfanView DWG File Parser memory corruption
Coercer: automatically coerce a Windows server to authenticate on an arbitrary machine
Coercer A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through many methods. Features Automatically detects open SMB pipes on the remote machine. Calls one by one all...
The post Coercer: automatically coerce a Windows server to authenticate on an arbitrary machine appeared first on Penetration Testing Tools.
一项重点工作的里程碑总结
一项重点工作的里程碑总结
首家京东自营外卖门店开业;小宇宙回应多名高管离职;国产新能源车保值率排名发布:SU7 第一 | 极客早知道
首家京东自营外卖门店开业;小宇宙回应多名高管离职;国产新能源车保值率排名发布:SU7 第一 | 极客早知道
派早报:OPPO 发布 K13 Turbo 系列,乐凯 C200 胶卷复售等
思科路由器交换机备份
Developers Beware of npm Phishing Email That Steal Your Login Credentials
A sophisticated phishing campaign has emerged targeting Node.js developers through a meticulously crafted attack that impersonates the official npm package registry. The malicious operation utilizes the typosquatted domain npnjs.com, substituting the letter “m” with “n” to create a nearly identical copy of the legitimate npmjs.com website. This attack demonstrates an alarming evolution in supply chain […]
The post Developers Beware of npm Phishing Email That Steal Your Login Credentials appeared first on Cyber Security News.
Sharp4WebCmd 再进化:无需依赖 cmd.exe 从命令到上传,一步到位
.NET 安全攻防知识交流社区
Microsoft SharePoint 零日漏洞详解与 ysoserial.Net 利用分析
CSOP2025看点 | 清华大学姚星昆:校园网安全闭环治理体系设计和实践
CSOP2025看点 | 清华大学姚星昆:校园网安全闭环治理体系设计和实践
CrowdStrike 宕机如何溅起水花
捆绑某VPN安装程序红队测试样本分析
捆绑某VPN安装程序红队测试样本分析
Piracy’s Hidden Cost: FMovies Linked to Massive Infostealer Campaign Compromising 1 Million+ Devices
Earlier this year, Microsoft published a study exposing a sweeping campaign involving the distribution of infostealers—malicious software designed to exfiltrate user data. According to the report, over one million devices were compromised, with the...
The post Piracy’s Hidden Cost: FMovies Linked to Massive Infostealer Campaign Compromising 1 Million+ Devices appeared first on Penetration Testing Tools.