
NuGet malware targets Nethereum tools
Highlighting an alarming trend, RL has discovered malicious packages targeting crypto wallets and OAuth tokens to steal funds.

Highlighting an alarming trend, RL has discovered malicious packages targeting crypto wallets and OAuth tokens to steal funds.

RL researchers have identified 19 malicious extensions on the VS Code Marketplace — the majority containing a malicious file posing as a PNG.

A wave of malware has spread to 795 npm packages — and been downloaded more than 100 million times.

Proving the road to takeover is paved with setuptools alternatives, the script for a popular Python package for building and installing PyPI packages leaves them vulnerable.

PowerShell Gallery’s Install-Module command presents one key link in the kill chain of a possible attack.

RL's analysis of an STD Group-operated RAT yielded file indicators to better detect the malware and two YARA rules.

RL researchers detected the first self-replicating worm that compromised npm packages with cloud token-stealing malware. Here's what you need to know.

RL discovered how the crypto contracts were abused — and how this incident is tied to a larger campaign to promote malicious packages on top repositories.

RL has discovered a loophole on VS Code Marketplace that allows threat actors to reuse legitimate, removed package names for malicious purposes.

The eslint-config-prettier package exposed more than 10,000 dependent projects. The incident highlights the growing risks in automated dependency updating.

ETHcode, a VS Code extension for Ethereum smart contract development, was compromised following a GitHub pull request.

ReversingLabs researchers discovered more than 60 GitHub repositories that contain hundreds of trojanized files.

RL researchers detected a new malicious campaign that exploits the Pickle file format on the Python Package Index.

RL researchers detected a sophisticated, malicious package believed to be an ongoing campaign that may be linked to a hacktivist gang.

ReversingLabs’ YARA detection rule for Conti can help you detect this ransomware in your environment. We provide tools and information that you can use to spot CONTI at work in your environment.
Get your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial