Shai-Hulud v2 Campaign Spreads From npm to Maven, Exposing Thousands of Secrets

26/11/2025 0 Comments 0 tags

The second wave of the Shai-Hulud supply chain attack has spilled over to the Maven ecosystem after compromising more than 830 packages in the npm registry. The Socket Research Team

Qilin Ransomware Turns South Korean MSP Breach Into 28-Victim ‘Korean Leaks’ Data Heist

26/11/2025 0 Comments 0 tags

South Korea’s financial sector has been targeted by what has been described as a sophisticated supply chain attack that led to the deployment of Qilin ransomware. “This operation combined the

When Your $2M Security Detection Fails: Can your SOC Save You?

26/11/2025 0 Comments 0 tags

Enterprises today are expected to have at least 6-8 detection tools, as detection is considered a standard investment and the first line of defense. Yet security leaders struggle to justify

Chrome Extension Caught Injecting Hidden Solana Transfer Fees Into Raydium Swaps

26/11/2025 0 Comments 0 tags

Cybersecurity researchers have discovered a new malicious extension on the Chrome Web Store that’s capable of injecting a stealthy Solana transfer into a swap transaction and transferring the funds to

Webinar: Learn to Spot Risks and Patch Safely with Community-Maintained Tools

26/11/2025 0 Comments 0 tags

If you’re using community tools like Chocolatey or Winget to keep systems updated, you’re not alone. These platforms are fast, flexible, and easy to work with—making them favorites for IT

RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware

26/11/2025 0 Comments 0 tags

The threat actors behind a malware family known as RomCom targeted a U.S.-based civil engineering company via a JavaScript loader dubbed SocGholish to deliver the Mythic Agent. “This is the

FBI Reports $262M in ATO Fraud as Researchers Cite Growing AI Phishing and Holiday Scams

26/11/2025 0 Comments 0 tags

The U.S. Federal Bureau of Investigation (FBI) has warned that cybercriminals are impersonating financial institutions with an aim to steal money or sensitive information to facilitate account takeover (ATO) fraud

Years of JSONFormatter and CodeBeautify Leaks Expose Thousands of Passwords and API Keys

25/11/2025 0 Comments 0 tags

New research has found that organizations in various sensitive sectors, including governments, telecoms, and critical infrastructure, are pasting passwords and credentials into online tools like JSONformatter and CodeBeautify that are

JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers

25/11/2025 0 Comments 0 tags

Cybersecurity researchers are calling attention to a new campaign that’s leveraging a combination of ClickFix lures and fake adult websites to deceive users into running malicious commands under the guise

ToddyCat’s New Hacking Tools Steal Outlook Emails and Microsoft 365 Access Tokens

25/11/2025 0 Comments 0 tags

The threat actor known as ToddyCat has been observed adopting new methods to obtain access to corporate email data belonging to target companies, including using a custom tool dubbed TCSectorCopy.