Exploits

Hijacked npm Packages Deliver Malware via Solana, Linked to Glassworm

Sonatype Security Research has identified two hijacked npm packages in the React Native ecosystem that receive more than 30,000 downloads collectively per...

Medusa ransomware gang claims attacks on prominent Mississippi hospital, New Jersey county

A prominent ransomware gang has taken credit for a devastating attack on the biggest hospital in Mississippi and a large county in New...

Ransomware’s Opening Play: Target Identity First

eSecurity Planet content and product recommendations are editorially independent. We may make money...

ClickFix Attack Targets Devs with MacSync Malware via Fake Claude Tools

It is usually the golden rule of cybersecurity to never click suspicious links. But a new campaign called Claude Fraud is proving that even...

Stryker hackers allegedly wiped tens of thousands of devices without using any malware

(Image credit: Microsoft) Share this article 0 Join the conversation Follow us Add us as a preferred source on Google Subscribe to our newsletter Handala hackers hit Stryker via compromised...

Malwarebytes Survey Finds 90% of People Don’t Trust AI with Their Data

New research reveals nearly universal distrust, surging support for national privacy laws and an inkling of hope through individual actions SANTA CLARA, Calif., March 17,...

Food and Ag-ISAC finds 72 active threat actors behind persistent, sophisticated cyber attacks targeting food supply chains

The Food and Ag-ISAC paints a stark picture of a sector facing sustained and increasingly sophisticated cyber pressure, with 72 active threat actors identified...

Konni Deploys EndRAT Through Spear-Phishing, Uses KakaoTalk to Propagate Malware

North Korean threat actors have been observed sending phishing to compromise targets and obtain access to a victim's KakaoTalk desktop application to distribute malicious...

CondiBot Malware and Monaco Miner Broaden Attacks On Network Hardware

The enterprise attack surface has fundamentally shifted, with financially motivated attackers now systematically exploiting network 

Latest articles