Multiple crypto packages hijacked, turned into info-stealers

Multiple crypto packages hijacked, turned into info-stealers

| | Malware, npm, Vulnerabilities
Sonatype has identified multiple npm cryptocurrency packages, latest versions of which have been hijacked and altered to steal sensitive information such as environment variables from the target victims ...
Apache Tomcat: Vulnerable versions downloaded nearly 100K times since PoC

Apache Tomcat: Vulnerable versions downloaded nearly 100K times since PoC

A rapidly exploited vulnerability with a major blast radius A recently disclosed vulnerability in Apache Tomcat, CVE-2025-24813, is drawing significant attention due to its ease of exploitation, rapid adoption by attackers, and ...
LLMs, MCP, Cato, AI, jailbreak, cybersecurity, DeepSeek, LLM, LLMs, attacks, multi-agent, Cybersecurity, AI, security, risk, Google AI LLM vulnerability

Cato Uses LLM-Developed Fictional World to Create Jailbreak Technique

A Cato Networks threat researcher with little coding experience was able to convince AI LLMs from DeepSeek, OpenAI, and Microsoft to bypass security guardrails and develop malware that could steal browser passwords ...
Security Boulevard
russia, EDR, threats, CrowdStrike Microsoft outages DDoS

China, Russia, North Korea Hackers Exploit Windows Security Flaw

Amost a dozen state-sponsored threat groups from Russia, China, and North Korea have been exploiting a security flaw in WIndows in attacks on governments and critical infrastructure that date back to 2017 ...
Security Boulevard
disney, code, data, API security ransomware extortion shift

New Akira Ransomware Decryptor Leans on Nvidia GPU Power

A software programmer developed a way to use brute force to break the encryption of the notorious Akira ransomware using GPU compute power and enabling some victims of the Linux-focused variant of ...
Security Boulevard
Application security trends: Shift-left security, AI, and open source malware

Application security trends: Shift-left security, AI, and open source malware

Software is at the heart of business operations across most industries, which means application security has never been more critical. However, as organizations embrace cloud-native architectures, microservices, and open source components, the ...
enemies, CISA, security,trump, states, infrastructure, PCLOB, president, Donald John Trump, President of the U.S.

Hackers Use Trump’s Coin, Binance’s Name in Crypto Phishing Scam

Threat actors are running an email phishing scam to entice victims to install Binance software in hopes of collecting TRUMP coins. However, if they try, they instead get the ConnectWise RAT installed ...
Security Boulevard
workforce, systems, security, security, spyware

Suspected North Korea Group Targets Android Devices with Spyware

A North Korea-backed threat group, APT37, disguised KoSpy as utility apps in Google Play to infect Android devices, using the spyware for such activities as gathering sensitive information, tracking locations, capturing screenshots, ...
Security Boulevard